| rfc9913.original | rfc9913.txt | |||
|---|---|---|---|---|
| RAW P. Thubert, Ed. | Internet Engineering Task Force (IETF) P. Thubert, Ed. | |||
| Internet-Draft | Request for Comments: 9913 | |||
| Intended status: Informational D. Cavalcanti | Category: Informational D. Cavalcanti | |||
| Expires: 17 October 2025 Intel | ISSN: 2070-1721 Intel | |||
| X. Vilajosana | X. Vilajosana | |||
| Universitat Oberta de Catalunya | Universitat Oberta de Catalunya | |||
| C. Schmitt | C. Schmitt | |||
| Research Institute CODE, UniBw M | Research Institute CODE, UniBw M | |||
| J. Farkas | J. Farkas | |||
| Ericsson | Ericsson | |||
| 15 April 2025 | February 2026 | |||
| Reliable and Available Wireless (RAW) Technologies | Reliable and Available Wireless (RAW) Technologies | |||
| draft-ietf-raw-technologies-17 | ||||
| Abstract | Abstract | |||
| This document surveys the short and middle range radio technologies | This document surveys the short- and middle-range radio technologies | |||
| that are suitable to provide a Deterministic Networking / Reliable | over which providing a Deterministic Networking (DetNet) / Reliable | |||
| and Available Wireless (RAW) service over, presents the | and Available Wireless (RAW) service is suitable, presents the | |||
| characteristics that RAW may leverage, and explores the applicability | characteristics that RAW may leverage, and explores the applicability | |||
| of the technologies to carry deterministic flows, as of its time of | of the technologies to carry deterministic flows, as of the time of | |||
| publication. The studied technologies are Wi-Fi 6/7, TimeSlotted | publication. The studied technologies are Wi-Fi 6/7, Time-Slotted | |||
| Channel Hopping (TSCH), 3GPP 5G, and L-band Digital Aeronautical | Channel Hopping (TSCH), 3GPP 5G, and L-band Digital Aeronautical | |||
| Communications System (LDACS). | Communications System (LDACS). | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
| provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Not all documents | |||
| approved by the IESG are candidates for any level of Internet | ||||
| Standard; see Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 17 October 2025. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9913. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2025 IETF Trust and the persons identified as the | Copyright (c) 2026 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
| extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
| described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
| provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
| in the Revised BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Terminology | |||
| 3. Towards Reliable and Available Wireless Networks . . . . . . 5 | 3. Towards Reliable and Available Wireless Networks | |||
| 3.1. Scheduling for Reliability . . . . . . . . . . . . . . . 5 | 3.1. Scheduling for Reliability | |||
| 3.2. Diversity for Availability . . . . . . . . . . . . . . . 5 | 3.2. Diversity for Availability | |||
| 3.3. Benefits of Scheduling . . . . . . . . . . . . . . . . . 6 | 3.3. Benefits of Scheduling | |||
| 4. IEEE 802.11 . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 4. IEEE 802.11 | |||
| 4.1. Provenance and Documents . . . . . . . . . . . . . . . . 8 | 4.1. Provenance and Documents | |||
| 4.2. 802.11ax High Efficiency (HE) . . . . . . . . . . . . . . 10 | 4.2. 802.11ax High Efficiency (HE) | |||
| 4.2.1. General Characteristics . . . . . . . . . . . . . . . 10 | 4.2.1. General Characteristics | |||
| 4.2.2. Applicability to Deterministic Flows . . . . . . . . 11 | 4.2.2. Applicability to Deterministic Flows | |||
| 4.3. 802.11be Extreme High Throughput (EHT) . . . . . . . . . 13 | 4.3. 802.11be Extreme High Throughput (EHT) | |||
| 4.3.1. General Characteristics . . . . . . . . . . . . . . . 13 | 4.3.1. General Characteristics | |||
| 4.3.2. Applicability to Deterministic Flows . . . . . . . . 14 | 4.3.2. Applicability to Deterministic Flows | |||
| 4.4. 802.11ad and 802.11ay (mmWave operation) . . . . . . . . 15 | 4.4. 802.11ad and 802.11ay (mmWave Operation) | |||
| 4.4.1. General Characteristics . . . . . . . . . . . . . . . 15 | 4.4.1. General Characteristics | |||
| 4.4.2. Applicability to deterministic flows . . . . . . . . 15 | 4.4.2. Applicability to Deterministic Flows | |||
| 5. IEEE 802.15.4 Timeslotted Channel Hopping . . . . . . . . . . 16 | 5. IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) | |||
| 5.1. Provenance and Documents . . . . . . . . . . . . . . . . 16 | 5.1. Provenance and Documents | |||
| 5.2. General Characteristics . . . . . . . . . . . . . . . . . 18 | 5.2. General Characteristics | |||
| 5.2.1. 6TiSCH Tracks . . . . . . . . . . . . . . . . . . . . 19 | 5.2.1. 6TiSCH Tracks | |||
| 5.3. Applicability to Deterministic Flows . . . . . . . . . . 23 | 5.3. Applicability to Deterministic Flows | |||
| 5.3.1. Centralized Path Computation . . . . . . . . . . . . 24 | 5.3.1. Centralized Path Computation | |||
| 6. 5G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 | 6. 5G | |||
| 6.1. Provenance and Documents . . . . . . . . . . . . . . . . 29 | 6.1. Provenance and Documents | |||
| 6.2. General Characteristics . . . . . . . . . . . . . . . . . 31 | 6.2. General Characteristics | |||
| 6.3. Deployment and Spectrum . . . . . . . . . . . . . . . . . 33 | 6.3. Deployment and Spectrum | |||
| 6.4. Applicability to Deterministic Flows . . . . . . . . . . 34 | 6.4. Applicability to Deterministic Flows | |||
| 6.4.1. System Architecture . . . . . . . . . . . . . . . . . 34 | 6.4.1. System Architecture | |||
| 6.4.2. Overview of The Radio Protocol Stack . . . . . . . . 36 | 6.4.2. Overview of the Radio Protocol Stack | |||
| 6.4.3. Radio (PHY) . . . . . . . . . . . . . . . . . . . . . 37 | 6.4.3. Radio (PHY) | |||
| 6.4.4. Scheduling and QoS (MAC) . . . . . . . . . . . . . . 39 | 6.4.4. Scheduling and QoS (MAC) | |||
| 6.4.5. Time-Sensitive Communications (TSC) . . . . . . . . . 41 | 6.4.5. Time-Sensitive Communications (TSC) | |||
| 7. L-band Digital Aeronautical Communications System . . . . . . 46 | 7. L-Band Digital Aeronautical Communications System (LDACS) | |||
| 7.1. Provenance and Documents . . . . . . . . . . . . . . . . 46 | 7.1. Provenance and Documents | |||
| 7.2. General Characteristics . . . . . . . . . . . . . . . . . 47 | 7.2. General Characteristics | |||
| 7.3. Deployment and Spectrum . . . . . . . . . . . . . . . . . 48 | 7.3. Deployment and Spectrum | |||
| 7.4. Applicability to Deterministic Flows . . . . . . . . . . 49 | 7.4. Applicability to Deterministic Flows | |||
| 7.4.1. System Architecture . . . . . . . . . . . . . . . . . 49 | 7.4.1. System Architecture | |||
| 7.4.2. Overview of the Radio Protocol Stack . . . . . . . . 49 | 7.4.2. Overview of the Radio Protocol Stack | |||
| 7.4.3. Radio (PHY) . . . . . . . . . . . . . . . . . . . . . 51 | 7.4.3. Radio (PHY) | |||
| 7.4.4. Scheduling, Frame Structure and QoS (MAC) . . . . . . 52 | 7.4.4. Scheduling, Frame Structure, and QoS (MAC) | |||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 54 | 8. IANA Considerations | |||
| 9. Security Considerations . . . . . . . . . . . . . . . . . . . 55 | 9. Security Considerations | |||
| 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 55 | 10. References | |||
| 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 55 | 10.1. Normative References | |||
| 12. Normative References . . . . . . . . . . . . . . . . . . . . 55 | 10.2. Informative References | |||
| 13. Informative References . . . . . . . . . . . . . . . . . . . 56 | Acknowledgments | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 65 | Contributors | |||
| Authors' Addresses | ||||
| 1. Introduction | 1. Introduction | |||
| Deterministic Networking (DetNet) [RFC8557] provides a capability to | Deterministic Networking (DetNet) [RFC8557] provides a capability to | |||
| carry specified unicast or multicast data flows for real-time | carry specified unicast or multicast data flows for real-time | |||
| applications with extremely low data loss rates and bounded latency | applications with extremely low data loss rates and bounded latency | |||
| within a network domain. Techniques that might be used include (1) | within a network domain. Techniques that might be used include (1) | |||
| reserving data-plane resources for individual (or aggregated) DetNet | reserving data plane resources for individual (or aggregated) DetNet | |||
| flows in some or all of the intermediate nodes along the path of the | flows in some or all of the intermediate nodes along the path of the | |||
| flow, (2) providing explicit routes for DetNet flows that do not | flow, (2) providing explicit routes for DetNet flows that do not | |||
| immediately change with the network topology, and (3) distributing | immediately change with the network topology, and (3) distributing | |||
| data from DetNet flow packets over time and/or space (e.g., different | data from DetNet flow packets over time and/or space (e.g., different | |||
| frequencies, or non-Shared Risk Links) to ensure delivery of each | frequencies or non-shared risk links) to ensure delivery of each | |||
| packet in spite of the unavailability of a path. DetNet operates at | packet in spite of the unavailability of a path. | |||
| the IP layer and typically delivers service over wired lower-layer | ||||
| technologies such as Time-Sensitive Networking (TSN) as defined by | ||||
| IEEE 802.1 and IEEE 802.3. | ||||
| The Reliable and Available Wireless (RAW) Architecture | DetNet operates at the IP layer and typically delivers service over | |||
| [I-D.ietf-raw-architecture] extends the DetNet Architecture [RFC8655] | wired lower-layer technologies such as Time-Sensitive Networking | |||
| to adapt to the specific challenges of the wireless medium, in | (TSN) as defined by IEEE 802.1 and IEEE 802.3. | |||
| particular intermittently lossy connectivity, by optimizing the use | ||||
| of diversity and multipathing. [I-D.ietf-raw-architecture] defines | The Reliable and Available Wireless (RAW) architecture [RFC9912] | |||
| the concepts of Reliability and Availability that are used in this | extends the DetNet architecture [RFC8655] to adapt to the specific | |||
| document. In turn, this document presents wireless technologies with | challenges of the wireless medium, in particular, intermittently | |||
| capabilities such as time synchronization and scheduling of | lossy connectivity, by optimizing the use of diversity and | |||
| transmission, that would make RAW/DetNet operations possible over | multipathing. [RFC9912] defines the concepts of reliability and | |||
| such media. The technologies studied in this document were | availability that are used in this document. In turn, this document | |||
| identified in the charter during the RAW WG formation and inherited | presents wireless technologies with capabilities, such as time | |||
| by DetNet (when the WG picked up the work on RAW). | synchronization and scheduling of transmission, that would make RAW/ | |||
| DetNet operations possible over such media. The technologies studied | ||||
| in this document were identified in the charter during the RAW | ||||
| Working Group (WG) formation and inherited by DetNet (when the WG | ||||
| picked up the work on RAW). | ||||
| Making wireless reliable and available is even more challenging than | Making wireless reliable and available is even more challenging than | |||
| it is with wires, due to the numerous causes of radio transmission | it is with wires, due to the numerous causes of radio transmission | |||
| losses that add up to the congestion losses and the delays caused by | losses that add up to the congestion losses and the delays caused by | |||
| overbooked shared resources. | overbooked shared resources. | |||
| RAW, like DetNet, needs and leverages lower-layer capabilities such | RAW, like DetNet, needs and leverages lower-layer capabilities such | |||
| as time synchronization and traffic shapers. To balance the adverse | as time synchronization and traffic shapers. To balance the adverse | |||
| effects of the radio transmission losses, RAW leverages additional | effects of the radio transmission losses, RAW leverages additional | |||
| lower-layer capabilities, some of which may be specific or at least | lower-layer capabilities, some of which may be specific or at least | |||
| more typically applied to wireless. Such lower-layer techniques | more typically applied to wireless. Such lower-layer techniques | |||
| include: | include: | |||
| * per-hop retransmissions (aka Automatic Repeat Request or ARQ), | * per-hop retransmissions (also known as Automatic Repeat Request | |||
| (ARQ)), | ||||
| * variation of the modulation and coding scheme (MCS), | * variation of the Modulation and Coding Scheme (MCS), | |||
| * short range broadcast, | * short-range broadcast, | |||
| * Multiple User - Multiple Input Multiple Output (MU-MIMO), | * Multi-User - Multiple Input Multiple Output (MU-MIMO), | |||
| * constructive interference, and | * constructive interference, and | |||
| * overhearing whereby multiple receivers are scheduled to receive | * overhearing whereby multiple receivers are scheduled to receive | |||
| the same transmission, which saves both energy on the sender and | the same transmission, which saves both energy on the sender and | |||
| spectrum. | spectrum. | |||
| These capabilities may be offered by the lower layer and may be | These capabilities may be offered by the lower layer and may be | |||
| controlled by RAW, separately or in combination. | controlled by RAW, separately or in combination. | |||
| RAW defines a network-layer control loop that optimizes the use of | RAW defines a network-layer control loop that optimizes the use of | |||
| links with constrained spectrum and energy while maintaining the | links with constrained spectrum and energy while maintaining the | |||
| expected connectivity properties, typically reliability and latency. | expected connectivity properties, typically reliability and latency. | |||
| The control loop involves communication monitoring through | The control loop involves communication monitoring through | |||
| Operations, Administration and Maintenance (OAM), path control | Operations, Administration, and Maintenance (OAM); path control | |||
| through a Path computation Element (PCE) and a runtime distributed | through a Path Computation Element (PCE) and a runtime distributed | |||
| Path Selection Engine (PSE) and extended packet replication, | Path Selection Engine (PSE); and extended Packet Replication, | |||
| elimination, and ordering functions (PREOF). | Elimination, and Ordering Functions (PREOF). | |||
| This document surveys the short and middle range radio technologies | This document surveys the short- and middle-range radio technologies | |||
| that are suitable to provide a DetNet/RAW service over, presents the | over which providing a DetNet/RAW service is suitable, presents the | |||
| characteristics that RAW may leverage, and explores the applicability | characteristics that RAW may leverage, and explores the applicability | |||
| of the technologies to carry deterministic flows. The studied | of the technologies to carry deterministic flows. The studied | |||
| technologies are Wi-Fi 6/7, TimeSlotted Channel Hopping (TSCH), 3GPP | technologies are Wi-Fi 6/7, Time-Slotted Channel Hopping (TSCH), 3GPP | |||
| 5G, and L-band Digital Aeronautical Communications System (LDACS). | 5G, and L-band Digital Aeronautical Communications System (LDACS). | |||
| The purpose of this document is to support and enable work on the | The purpose of this document is to support and enable work on the | |||
| these (and possibly other similar compatible technologies) at the | these (and possibly other similar compatible technologies) at the | |||
| IETF specifically in the DetNet working group working on RAW. | IETF, specifically in the DetNet Working Group working on RAW. | |||
| This document surveys existing networking technology and defines no | This document surveys existing networking technology; it does not | |||
| protocol behaviors or operational practices. The IETF specifications | define protocol behaviors or operational practices. The IETF | |||
| referenced herein each provide their own Security Considerations, and | specifications referenced herein each provide their own security | |||
| lower layer technologies provide their own security at Layer-2; a | considerations, and lower-layer technologies provide their own | |||
| security study of the technologies is explicitly not in scope. | security at Layer 2; a security study of the technologies is | |||
| explicitly not in scope. | ||||
| 2. Terminology | 2. Terminology | |||
| This document uses the terminology and acronyms defined in Section 2 | This document uses the terminology and acronyms defined in Section 2 | |||
| of [RFC8655] and Section 2 of [I-D.ietf-raw-architecture]. | of [RFC8655] and Section 3 of [RFC9912]. | |||
| 3. Towards Reliable and Available Wireless Networks | 3. Towards Reliable and Available Wireless Networks | |||
| 3.1. Scheduling for Reliability | 3.1. Scheduling for Reliability | |||
| A packet network is reliable for critical (e.g., time-sensitive) | A packet network is reliable for critical (e.g., time-sensitive) | |||
| packets when the undesirable statistical effects that affect the | packets when the undesirable statistical effects that affect the | |||
| transmission of those packets, e.g., delay or loss, are eliminated. | transmission of those packets (e.g., delay or loss) are eliminated. | |||
| The reliability of a Deterministic Network [RFC8655] often relies on | The reliability of a deterministic network [RFC8655] often relies on | |||
| precisely applying a tight schedule that controls the use of time- | precisely applying a tight schedule that controls the use of time- | |||
| shared resources such as CPUs and buffers, and maintains at all time | shared resources such as CPUs and buffers, and maintains at all times | |||
| the amount of the critical packets within the available resources of | the number of the critical packets within the available resources of | |||
| the communication hardware (e.g.; buffers) and that of the | the communication hardware (e.g., buffers) and the transmission | |||
| transmission medium (e.g.; bandwidth, transmission slots). The | medium (e.g., bandwidth, transmission slots). The schedule can also | |||
| schedule can also be used to shape the flows by controlling the time | be used to shape the flows by controlling the time of transmission of | |||
| of transmission of the packets that compose the flow at every hop. | the packets that compose the flow at every hop. | |||
| To achieve this, there must be a shared sense of time throughout the | To achieve this, there must be a shared sense of time throughout the | |||
| network. The sense of time is usually provided by the lower layer | network. The sense of time is usually provided by the lower layer | |||
| and is not in scope for RAW. As an example, the Precision Time | and is not in scope for RAW. As an example, the Precision Time | |||
| Protocol, standardized as IEEE 1588 and IEC 61588, has mapping | Protocol (PTP), standardized as IEEE 1588 and IEC 61588, has mapping | |||
| through profiles to Ethernet, industrial and SmartGrid protocols, and | through profiles to Ethernet, industrial and SmartGrid protocols, and | |||
| Wi-Fi with IEEE Std 802.1AS. | Wi-Fi with IEEE Std 802.1AS. | |||
| 3.2. Diversity for Availability | 3.2. Diversity for Availability | |||
| Equipment (e.g., node) failure, for instance a broken switch or an | Equipment (e.g., node) failure can be the cause of multiple packets | |||
| being lost in a row before the flows are rerouted or the system | ||||
| recovers. Examples of equipment failure include a broken switch, an | ||||
| access point rebooting, a broken wire or radio adapter, or a fixed | access point rebooting, a broken wire or radio adapter, or a fixed | |||
| obstacle to the transmission, can be the cause of multiple packets | obstacle to the transmission. | |||
| lost in a row before the flows are rerouted or the system may | ||||
| recover. | ||||
| This is not acceptable for critical applications such as related to | Equipment failure is not acceptable for critical applications such as | |||
| safety. A typical process control loop will tolerate an occasional | those related to safety. A typical process control loop will | |||
| packet loss, but a loss of several packets in a row will cause an | tolerate an occasional packet loss, but a loss of several packets in | |||
| emergency stop. In an amusement ride (e.g., at Disneyland, | a row will cause an emergency stop. In an amusement ride (e.g., at | |||
| Universal, or MGM Studios parks) a continuous loss of packet for a | Disneyland, Universal Studios, or MGM Studios parks), a continuous | |||
| few 100ms may trigger an automatic interruption of the ride and cause | loss of packets for a few 100 ms may trigger an automatic | |||
| the evacuation of the attraction floor to restart it. | interruption of the ride and cause the evacuation of the attraction | |||
| floor to restart it. | ||||
| Network Availability is obtained by making the transmission resilient | Network availability is obtained by making the transmission resilient | |||
| against hardware failures and radio transmission losses due to | against hardware failures and radio transmission losses due to | |||
| uncontrolled events such as co-channel interferers, multipath fading | uncontrolled events such as co-channel interferers, multipath fading, | |||
| or moving obstacles. The best results are typically achieved by | or moving obstacles. The best results are typically achieved by | |||
| pseudo-randomly cumulating all forms of diversity, in the spatial | pseudorandomly cumulating all forms of diversity -- in the spatial | |||
| domain with replication and elimination, in the time domain with ARQ | domain with replication and elimination, in the time domain with ARQ | |||
| and diverse scheduled transmissions, and in the frequency domain with | and diverse scheduled transmissions, and in the frequency domain with | |||
| frequency hopping or channel hopping between frames. | frequency hopping or channel hopping between frames. | |||
| 3.3. Benefits of Scheduling | 3.3. Benefits of Scheduling | |||
| Scheduling redundant transmissions of the critical packets on diverse | Scheduling redundant transmissions of the critical packets on diverse | |||
| paths improves the resiliency against breakages and statistical | paths improves the resiliency against breakages and statistical | |||
| transmission loss, such as due to cosmic particles on wires, and | transmission loss, such as those due to cosmic particles on wires and | |||
| interferences on wireless. While transmission losses are orders of | interferences on wireless. While transmission losses are orders of | |||
| magnitude more frequent on wireless, redundancy and diversity are | magnitude more frequent on wireless, redundancy and diversity are | |||
| needed in all cases for life- and mission-critical applications. | needed in all cases for life- and mission-critical applications. | |||
| When required, the worst case time of delivery can be guaranteed as | When required, the worst-case time of delivery can be guaranteed as | |||
| part of the end-to-end schedule, and the sense of time that must be | part of the end-to-end schedule, and the sense of time that must be | |||
| shared throughout the network can be exposed to and leveraged by | shared throughout the network can be exposed to and leveraged by | |||
| other applications. | other applications. | |||
| In addition, scheduling provides specific value over the wireless | In addition, scheduling provides specific value over the wireless | |||
| medium: | medium: | |||
| * Scheduling allows a time-sharing operation, where every | * Scheduling allows a time-sharing operation, where every | |||
| transmission is assigned its own time/frequency resource. Sender | transmission is assigned its own time/frequency resource. The | |||
| and receiver are synchronized and scheduled to talk on a given | sender and receiver are synchronized and scheduled to talk on a | |||
| frequency resource at a given time and for a given duration. This | given frequency resource at a given time and for a given duration. | |||
| way, scheduling can avoid collisions between scheduled | This way, scheduling can avoid collisions between scheduled | |||
| transmissions and enable a high ratio of critical traffic (think | transmissions and enable a high ratio of critical traffic (think | |||
| 60 or 70% of high priority traffic with ultra low loss) compared | 60% or 70% of high-priority traffic with ultra low loss) compared | |||
| to statistical priority-based schemes. | to statistical priority-based schemes. | |||
| * Scheduling can be used as a technique for both time and frequency | * Scheduling can be used as a technique for both time and frequency | |||
| diversity (e.g., between transmission retries), allowing the next | diversity (e.g., between transmission retries), allowing the next | |||
| transmission to happen on a different frequency as programmed in | transmission to happen on a different frequency as programmed in | |||
| both the sender and the receiver. This is useful to defeat co- | both the sender and the receiver. This is useful to defeat co- | |||
| channel interference from un-controlled transmitters as well as | channel interference from uncontrolled transmitters as well as | |||
| multipath fading. | multipath fading. | |||
| * Transmissions can be also scheduled on multiple channels in | * Transmissions can be also scheduled on multiple channels in | |||
| parallel, which enables using the full available spectrum while | parallel, which enables the use of the full available spectrum | |||
| avoiding the hidden terminal problem, e.g., when the next packet | while avoiding the hidden terminal problem, e.g., when the next | |||
| in a same flow interferes on a same channel with the previous one | packet in a same flow interferes on a same channel with the | |||
| that progressed a few hops farther. | previous one that progressed a few hops farther. | |||
| * On the other hand, scheduling optimizes the bandwidth usage: | * Scheduling optimizes the bandwidth usage. Compared to classical | |||
| compared to classical Collision Avoidance techniques, there is no | collision avoidance techniques, there is no blank time related to | |||
| blank time related to inter-frame space (IFS) and exponential | Interframe Space (IFS) and exponential back-off in scheduled | |||
| back-off in scheduled operations. A minimal Clear Channel | operations. A minimal clear channel assessment may be needed to | |||
| Assessment may be needed to comply with the local regulations such | comply with the local regulations such as ETSI 300-328, but that | |||
| as ETSI 300-328, but that will not detect a collision when the | will not detect a collision when the senders are synchronized. | |||
| senders are synchronized. | ||||
| * Finally, scheduling plays a critical role to save energy. In IoT, | * Scheduling plays a critical role in saving energy. In the | |||
| energy is the foremost concern, and synchronizing sender and | Internet of Things (IoT), energy is the foremost concern, and | |||
| listener enables always maintaining them in deep sleep when there | synchronizing the sender and listener enables always maintaining | |||
| is no scheduled transmission. This avoids idle listening and long | them in deep sleep when there is no scheduled transmission. This | |||
| preambles and enables long sleep periods between traffic and | avoids idle listening and long preambles, and it enables long | |||
| resynchronization, allowing battery-operated nodes to operate in a | sleep periods between traffic and resynchronization, allowing | |||
| mesh topology for multiple years. | battery-operated nodes to operate in a mesh topology for multiple | |||
| years. | ||||
| 4. IEEE 802.11 | 4. IEEE 802.11 | |||
| In the recent years, the evolution of the IEEE Std 802.11 standard | In recent years, the evolution of the IEEE Std 802.11 standard has | |||
| has taken a new direction, emphasizing improved reliability and | taken a new direction, emphasizing improved reliability and reduced | |||
| reduced latency in addition to minor improvements in speed, to enable | latency in addition to minor improvements in speed, to enable new | |||
| new fields of application such as Industrial IoT and Virtual Reality. | fields of application such as industrial IoT and Virtual Reality | |||
| (VR). | ||||
| Leveraging IEEE Std 802.11, the Wi-Fi Alliance [WFA] delivered Wi-Fi | Leveraging IEEE Std 802.11, the Wi-Fi Alliance [WFA] delivered Wi-Fi | |||
| 6, 7, and now 8 with more capabilities to schedule and deliver frames | 6, 7, and now 8 with more capabilities to schedule and deliver frames | |||
| in due time at fast rates. Still, as any radio technology, Wi-Fi is | in due time at fast rates. Still, as with any radio technology, Wi- | |||
| sensitive to frame loss, which can only be combated with the maximum | Fi is sensitive to frame loss, which can only be combated with the | |||
| use of diversity, in space, time, channel, and even technology. | maximum use of diversity in space, time, channel, and even | |||
| technology. | ||||
| In parallel, the Avnu Alliance [Avnu], which focuses on applications | In parallel, the Avnu Alliance [Avnu], which focuses on applications | |||
| of TSN for real time data, formed a workgroup for uses case with TSN | of TSN for real-time data, formed a workgroup for uses case with TSN | |||
| capabilities over wireless, leveraging both 3GPP and IEEE Std 802.11 | capabilities over wireless, leveraging both 3GPP and IEEE Std 802.11 | |||
| standards. | standards. | |||
| To achieve the latter, the reliability must be handled at an upper | To achieve the latter, the reliability must be handled at an upper | |||
| layer that can select Wi-Fi and other wired or wireless technologies | layer that can select Wi-Fi and other wired or wireless technologies | |||
| for parallel transmissions. This is where RAW comes into play. | for parallel transmissions. This is where RAW comes into play. | |||
| This section surveys 802.11 features that are most relevant to RAW, | This section surveys the IEEE 802.11 features that are most relevant | |||
| noting that there are a great many more in the specification, some of | to RAW, noting that there are a great many more in the specification, | |||
| which possibly of interest as well for a RAW solution. For instance, | some of which may also possibly be of interest for a RAW solution. | |||
| frame fragmentation reduces the impact of a very transient | For instance, frame fragmentation reduces the impact of a very | |||
| transmission loss, both on latency and energy consumption. | transient transmission loss, both on latency and energy consumption. | |||
| 4.1. Provenance and Documents | 4.1. Provenance and Documents | |||
| The IEEE 802 LAN/MAN Standards Committee (SC) develops and maintains | The IEEE 802 LAN/MAN Standards Committee (SC) develops and maintains | |||
| networking standards and recommended practices for local, | networking standards and recommended practices for local, | |||
| metropolitan, and other area networks, using an open and accredited | metropolitan, and other area networks using an open and accredited | |||
| process, and advocates them on a global basis. The most widely used | process, and it advocates them on a global basis. The most widely | |||
| standards are for Ethernet, Bridging and Virtual Bridged LANs | used standards are for Ethernet, Bridging and Virtual Bridged LAN, | |||
| Wireless LAN, Wireless PAN, Wireless MAN, Wireless Coexistence, Media | Wireless LAN, Wireless Personal Area Network (PAN), Wireless MAN, | |||
| Independent Handover Services, and Wireless RAN. An individual | Wireless Coexistence, Media Independent Handover Services, and | |||
| Working Group provides the focus for each area. | Wireless Radio Access Network (RAN). An individual working group | |||
| provides the focus for each area. | ||||
| The IEEE 802.11 Wireless LAN (WLAN) standards define the underlying | The IEEE 802.11 Wireless LAN (WLAN) standards define the underlying | |||
| MAC and PHY layers for the Wi-Fi technology. While previous 802.11 | Medium Access Control (MAC) and Physical (PHY) layers for the Wi-Fi | |||
| generations, such as 802.11n and 802.11ac, have focused mainly on | technology. While previous 802.11 generations, such as 802.11n and | |||
| improving peak throughput, more recent generations are also | 802.11ac, focused mainly on improving peak throughput, more recent | |||
| considering other performance vectors, such as efficiency | generations are also considering other performance vectors, such as | |||
| enhancements for dense environments in IEEEE Std 802.11ax [IEEE Std | efficiency enhancements for dense environments in IEEEE Std 802.11ax | |||
| 802.11ax] (approved in 2021), throughput, latency, and reliability | [IEEE802.11ax] (approved in 2021) and throughput, latency, and | |||
| enhancements in P802.11be [IEEE 802.11be] (approved in 2024). | reliability enhancements in IEEE Std 802.11be [IEEE802.11be] | |||
| (approved in 2024). | ||||
| IEEE Std 802.11-2012 includes support for TSN time synchronization | IEEE Std 802.11-2012 includes support for TSN time synchronization | |||
| based on IEEE 802.1AS over 802.11 Timing Measurement protocol. IEEE | based on IEEE 802.1AS over the 802.11 Timing Measurement protocol. | |||
| Std 802.11-2016 additionally includes an extension to the 802.1AS | IEEE Std 802.11-2016 additionally includes an extension to the | |||
| operation over 802.11 for Fine Timing Measurement (FTM), as well as | 802.1AS operation over 802.11 for Fine Timing Measurement (FTM), as | |||
| the Stream Reservation Protocol (IEEE 802.1Qat). 802.11 WLANs can | well as the Stream Reservation Protocol (IEEE 802.1Qat). 802.11 WLANs | |||
| also be part of a 802.1Q bridged networks with enhancements enabled | can also be part of 802.1Q bridged networks with enhancements enabled | |||
| by the 802.11ak amendment retrofitted in IEEE Std 802.11-2020. | by the 802.11ak amendment retrofitted in IEEE Std 802.11-2020. | |||
| Traffic classification based on 802.1Q VLAN tags is also supported in | Traffic classification based on 802.1Q VLAN tags is also supported in | |||
| 802.11. Other 802.1 TSN capabilities such as 802.1Qbv and 802.1CB, | 802.11. Other 802.1 TSN capabilities such as 802.1Qbv and 802.1CB, | |||
| which are media agnostic, can already operate over 802.11. The IEEE | which are media agnostic, can already operate over 802.11. The IEEE | |||
| Std 802.11ax-2021 defines additional scheduling capabilities that can | Std 802.11ax-2021 defines additional scheduling capabilities that can | |||
| enhance the timeliness performance in the 802.11 MAC and achieve | enhance the timeliness performance in the 802.11 MAC and achieve | |||
| lower bounded latency. The IEEE 802.11be has introduced features to | lower-bounded latency. IEEE 802.11be introduces features to enhance | |||
| enhance the support for 802.1 TSN capabilities especially related to | the support for 802.1 TSN capabilities, especially those related to | |||
| worst-case latency, reliability and availability. | worst-case latency, reliability, and availability. | |||
| The IEEE 802.11 working group has been working in collaboration with | The IEEE 802.11 Working Group has been working in collaboration with | |||
| the IEEE 802.1 working group for several years extending some 802.1 | the IEEE 802.1 Working Group for several years, extending some 802.1 | |||
| features over 802.11. As with any wireless media, 802.11 imposes new | features over 802.11. As with any wireless media, 802.11 imposes new | |||
| constraints and restrictions to TSN-grade QoS, and tradeoffs between | constraints and restrictions to TSN-grade QoS, and trade-offs between | |||
| latency and reliability guarantees must be considered as well as | latency and reliability guarantees must be considered as well as | |||
| managed deployment requirements. An overview of 802.1 TSN | managed deployment requirements. An overview of 802.1 TSN | |||
| capabilities and challenges for their extensions to 802.11 are | capabilities and challenges for their extensions to 802.11 are | |||
| discussed in [Cavalcanti_2019]. | discussed in [Cavalcanti_2019]. | |||
| Wi-Fi Alliance is the worldwide network of companies that drives | The Wi-Fi Alliance is the worldwide network of companies that drives | |||
| global Wi-Fi adoption and evolution through thought leadership, | global Wi-Fi adoption and evolution through thought leadership, | |||
| spectrum advocacy, and industry-wide collaboration. The WFA work | spectrum advocacy, and industry-wide collaboration. The WFA work | |||
| helps ensure that Wi-Fi devices and networks provide users the | helps ensure that Wi-Fi devices and networks provide users the | |||
| interoperability, security, and reliability they have come to expect. | interoperability, security, and reliability they have come to expect. | |||
| Avnu Alliance is also a global industry forum developing | The Avnu Alliance is also a global industry forum developing | |||
| interoperability testing for TSN capable devices across multiple | interoperability testing for TSN-capable devices across multiple | |||
| media including Ethernet, Wi-Fi, and 5G. | media including Ethernet, Wi-Fi, and 5G. | |||
| The following [IEEE Std 802.11] specifications/certifications are | The following IEEE Std 802.11 specifications/certifications | |||
| relevant in the context of reliable and available wireless services | [IEEE802.11] are relevant in the context of reliable and available | |||
| and support for time-sensitive networking capabilities: | wireless services and support for TSN capabilities: | |||
| Time Synchronization: IEEE802.11-2016 with IEEE802.1AS; WFA TimeSync | * Time synchronization: IEEE Std 802.11-2016 with IEEE Std 802.1AS; | |||
| Certification. | WFA TimeSync Certification | |||
| Congestion Control: IEEE Std 802.11-2016 Admission Control; WFA | * Congestion control: IEEE Std 802.11-2016 Admission Control; WFA | |||
| Admission Control. | Admission Control | |||
| Security: WFA Wi-Fi Protected Access, WPA2 and WPA3. | * Security: WFA Wi-Fi Protected Access, WPA2, and WPA3 | |||
| Interoperating with IEEE802.1Q bridges: IEEE Std 802.11-2020 | * Interoperating with IEEE 802.1Q bridges: IEEE Std 802.11-2020 | |||
| incorporating 802.11ak. | incorporating 802.11ak | |||
| Stream Reservation Protocol (part of [IEEE Std 802.1Qat]): | * Stream Reservation Protocol (part of [IEEE802.1Qat]): | |||
| AIEEE802.11-2016 | AIEEE802.11-2016 | |||
| Scheduled channel access: IEEE802.11ad Enhancements for very high | * Scheduled channel access: IEEE 802.11ad enhancements for very high | |||
| throughput in the 60 GHz band [IEEE Std 802.11ad]. | throughput in the 60 GHz band [IEEE802.11ad] | |||
| 802.11 Real-Time Applications: Topic Interest Group (TIG) ReportDoc | * 802.11 Real-Time Applications: Topic Interest Group (TIG) | |||
| [IEEE_doc_11-18-2009-06]. | ReportDoc [IEEE_doc_11-18-2009-06] | |||
| In addition, major amendments being developed by the IEEE802.11 | In addition, major amendments being developed by the IEEE 802.11 | |||
| Working Group include capabilities that can be used as the basis for | Working Group include capabilities that can be used as the basis for | |||
| providing more reliable and predictable wireless connectivity and | providing more reliable and predictable wireless connectivity and | |||
| support time-sensitive applications: | support time-sensitive applications: | |||
| IEEE 802.11ax: Enhancements for High Efficiency (HE). [IEEE Std | * [IEEE802.11ax]: Enhancements for High Efficiency (HE) | |||
| 802.11ax] | ||||
| IEEE 802.11be Extreme High Throughput (EHT). [IEEE 802.11be] | * [IEEE802.11be]: Extreme High Throughput (EHT) | |||
| * [IEEE802.11ay]: Enhanced throughput for operation in license- | ||||
| exempt bands above 45 GHz | ||||
| IEE 802.11ay Enhanced throughput for operation in license-exempt | ||||
| bands above 45 GHz. [IEEE Std 802.11ay] | ||||
| The main 802.11ax, 802.11be, 802.11ad, and 802.11ay capabilities and | The main 802.11ax, 802.11be, 802.11ad, and 802.11ay capabilities and | |||
| their relevance to RAW are discussed in the remainder of this | their relevance to RAW are discussed in the remainder of this | |||
| section. As P802.11bn is still in early stages of development, its | section. As P802.11bn is still in early stages of development, its | |||
| capabilities are not included in this document. | capabilities are not included in this document. | |||
| 4.2. 802.11ax High Efficiency (HE) | 4.2. 802.11ax High Efficiency (HE) | |||
| 4.2.1. General Characteristics | 4.2.1. General Characteristics | |||
| The next generation Wi-Fi (Wi-Fi 6) is based on the IEEE802.11ax | The next generation Wi-Fi (Wi-Fi 6) is based on the IEEE Std 802.11ax | |||
| amendment [IEEE Std 802.11ax], which includes specific capabilities | amendment [IEEE802.11ax], which includes specific capabilities to | |||
| to increase efficiency, control and reduce latency. Some of these | increase efficiency, control and reduce latency. Some of these | |||
| features include higher order 1024-QAM modulation, support for uplink | features include higher-order 1024-QAM modulation, support for uplink | |||
| multiple user (MU) multiple input multiple output (MIMO), orthogonal | Multi-User - Multiple Input Multiple Output (MU-MIMO), Orthogonal | |||
| frequency-division multiple access (OFDMA), trigger-based access and | Frequency-Division Multiple Access (OFDMA), trigger-based access, and | |||
| Target Wake time (TWT) for enhanced power savings. The OFDMA mode | Target Wake Time (TWT) for enhanced power savings. The OFDMA mode | |||
| and trigger-based access enable the AP, after reserving the channel | and trigger-based access enable the Access Point (AP), after | |||
| using the clear channel assessment procedure for a given duration, to | reserving the channel using the clear channel assessment procedure | |||
| schedule multi-user transmissions, which is a key capability required | for a given duration, to schedule multi-user transmissions, which is | |||
| to increase latency predictability and reliability for time-sensitive | a key capability required to increase latency predictability and | |||
| flows. 802.11ax can operate in up to 160 MHz channels and it includes | reliability for time-sensitive flows. 802.11ax can operate in up to | |||
| support for operation in the new 6 GHz band, which has been open to | 160 MHz channels, and it includes support for operation in the new 6 | |||
| unlicensed use by the FCC and other regulatory agencies worldwide. | GHz band, which has been open to unlicensed use by the Federal | |||
| Communications Commission (FCC) and other regulatory agencies | ||||
| worldwide. | ||||
| 4.2.1.1. Multi-User OFDMA and Trigger-based Scheduled Access | 4.2.1.1. Multi-User OFDMA and Trigger-Based Scheduled Access | |||
| 802.11ax introduced an OFDMA mode in which multiple users can be | 802.11ax introduced an OFDMA mode in which multiple users can be | |||
| scheduled across the frequency domain. In this mode, the Access | scheduled across the frequency domain. In this mode, the Access | |||
| Point (AP) can initiate multi-user (MU) Uplink (UL) transmissions in | Point (AP) can initiate multi-user uplink (UL) transmissions in the | |||
| the same PHY Protocol Data Unit (PPDU) by sending a trigger frame. | same PHY Protocol Data Unit (PPDU) by sending a trigger frame. This | |||
| This centralized scheduling capability gives the AP much more control | centralized scheduling capability gives the AP much more control of | |||
| of the channel in its Basic Service Set (BSS) and it can remove | the channel in its Basic Service Set (BSS), and it can remove | |||
| contention between associated stations for uplink transmissions, | contention between associated stations for uplink transmissions, | |||
| therefore reducing the randomness caused by CSMA-based access between | therefore reducing the randomness caused by access based on Carrier | |||
| stations within the same BSS. The AP can also transmit | Sense Multiple Access (CSMA) between stations within the same BSS. | |||
| simultaneously to multiple users in the downlink direction by using a | The AP can also transmit simultaneously to multiple users in the | |||
| Downlink (DL) MU OFDMA PPDU. In order to initiate a contention free | downlink direction by using a downlink (DL) MU OFDMA PPDU. In order | |||
| Transmission Opportunity (TXOP) using the OFDMA mode, the AP still | to initiate a contention-free Transmission Opportunity (TXOP) using | |||
| follows the typical listen before talk procedure to acquire the | the OFDMA mode, the AP still follows the typical listen-before-talk | |||
| medium, which ensures interoperability and compliance with unlicensed | procedure to acquire the medium, which ensures interoperability and | |||
| band access rules. However, 802.11ax also includes a multi-user | compliance with unlicensed band access rules. However, 802.11ax also | |||
| Enhanced Distributed Channel Access (MU-EDCA) capability, which | includes a Multi-User Enhanced Distributed Channel Access (MU-EDCA) | |||
| allows the AP to get higher channel access priority than other | capability, which allows the AP to get higher channel access priority | |||
| devices in its BSS. | than other devices in its BSS. | |||
| 4.2.1.2. Traffic Isolation via OFDMA Resource Management and Resource | 4.2.1.2. Traffic Isolation via OFDMA Resource Management and Resource | |||
| Unit Allocation | Unit Allocation | |||
| 802.11ax relies on the notion of OFDMA Resource Unit (RU) to allocate | 802.11ax relies on the notion of an OFDMA Resource Unit (RU) to | |||
| frequency chunks to different STAs over time. RUs provide a way to | allocate frequency chunks to different stations over time. RUs | |||
| allow for multiple stations to transmit simultaneously, starting and | provide a way to allow multiple stations to transmit simultaneously, | |||
| ending at the same time. The way this is achieved is via padding, | starting and ending at the same time. The way this is achieved is | |||
| where extra bits are transmitted with the same power level. The | via padding, where extra bits are transmitted with the same power | |||
| current RU allocation algorithms provide a way to achieve traffic | level. The current RU allocation algorithms provide a way to achieve | |||
| isolation per station which while per se does not support time-aware | traffic isolation per station. While this does not support time- | |||
| scheduling, is a key aspect to assist reliability, as it provides | aware scheduling per se, it is a key aspect to assist reliability, as | |||
| traffic isolation in a shared medium. | it provides traffic isolation in a shared medium. | |||
| 4.2.1.3. Improved PHY Robustness | 4.2.1.3. Improved PHY Robustness | |||
| The 802.11ax PHY can operate with 0.8, 1.6 or 3.2 microsecond guard | The 802.11ax PHY can operate with a 0.8, 1.6, or 3.2 microsecond | |||
| interval (GI). The larger GI options provide better protection | Guard Interval (GI). The larger GI options provide better protection | |||
| against multipath, which is expected to be a challenge in industrial | against multipath, which is expected to be a challenge in industrial | |||
| environments. The possibility to operate with smaller resource units | environments. The possibility of operating with smaller RUs (e.g., 2 | |||
| (e.g. 2 MHz) enabled by OFDMA also helps reduce noise power and | MHz) enabled by OFDMA also helps reduce noise power and improve | |||
| improve SNR, leading to better packet error rate (PER) performance. | Signal-to-Noise Ratio (SNR), leading to better Packet Error Rate | |||
| (PER) performance. | ||||
| 802.11ax supports beamforming as in 802.11ac, but introduces UL MU | 802.11ax supports beamforming as in 802.11ac but introduces UL MU- | |||
| MIMO, which helps improve reliability. The UL MU MIMO capability is | MIMO, which helps improve reliability. The UL MU-MIMO capability is | |||
| also enabled by the trigger based access operation in 802.11ax. | also enabled by the trigger-based access operation in 802.11ax. | |||
| 4.2.1.4. Support for 6GHz Band | 4.2.1.4. Support for 6 GHz Band | |||
| The 802.11ax specification [IEEE Std 802.11ax] includes support for | The 802.11ax specification [IEEE802.11ax] includes support for | |||
| operation in the 6 GHz band. Given the amount of new spectrum | operation in the 6 GHz band. Given the amount of new spectrum | |||
| available as well as the fact that no legacy 802.11 device (prior | available, as well as the fact that no legacy 802.11 device (prior | |||
| 802.11ax) will be able to operate in this band, 802.11ax operation in | 802.11ax) will be able to operate in this band, 802.11ax operation in | |||
| this new band can be even more efficient. | this new band can be even more efficient. | |||
| 4.2.2. Applicability to Deterministic Flows | 4.2.2. Applicability to Deterministic Flows | |||
| TSN capabilities, as defined by the IEEE 802.1 TSN standards, provide | TSN capabilities, as defined by the IEEE 802.1 TSN standards, provide | |||
| the underlying mechanism for supporting deterministic flows in a | the underlying mechanism for supporting deterministic flows in a | |||
| Local Area Network (LAN). The 802.11 working group has incorporated | Local Area Network (LAN). The IEEE 802.11 Working Group has | |||
| support for absolute time synchronization to extend the TSN 802.1AS | incorporated support for absolute time synchronization to extend the | |||
| protocol so that time-sensitive flow can experience precise time | TSN 802.1AS protocol so that time-sensitive flows can experience | |||
| synchronization when operating over 802.11 links. As IEEE 802.11 and | precise time synchronization when operating over 802.11 links. As | |||
| IEEE 802.1 TSN are both based on the IEEE 802 architecture, 802.11 | IEEE 802.11 and IEEE 802.1 TSN are both based on the IEEE 802 | |||
| devices can directly implement some TSN capabilities without the need | architecture, 802.11 devices can directly implement some TSN | |||
| for a gateway/translation protocol. Basic features required for | capabilities without the need for a gateway/translation protocol. | |||
| operation in a 802.1Q LAN are already enabled for 802.11. Some TSN | Basic features required for operation in a 802.1Q LAN are already | |||
| capabilities, such as 802.1Qbv, can already operate over the existing | enabled for 802.11. Some TSN capabilities, such as 802.1Qbv, can | |||
| 802.11 MAC SAP [Sudhakaran2021]. Implementation and experimental | already operate over the existing 802.11 MAC SAP [Sudhakaran2021]. | |||
| results of TSN capabilities (802.1AS, 802.1Qbv, and 802.1CB) extended | Implementation and experimental results of TSN capabilities (802.1AS, | |||
| over standard Ethernet and Wi-Fi devices have also been described in | 802.1Qbv, and 802.1CB) extended over standard Ethernet and Wi-Fi | |||
| [Fang_2021]. Nevertheless, the IEEE 802.11 MAC/PHY could be extended | devices have also been described in [Fang_2021]. Nevertheless, the | |||
| to improve the operation of IEEE 802.1 TSN features and achieve | IEEE 802.11 MAC/PHY could be extended to improve the operation of | |||
| better performance metrics [Cavalcanti1287]. | IEEE 802.1 TSN features and achieve better performance metrics | |||
| [Cavalcanti1287]. | ||||
| TSN capabilities supported over 802.11 (which also extends to | TSN capabilities supported over 802.11 (which also extends to | |||
| 802.11ax), include: | 802.11ax) include: | |||
| 1. 802.1AS based Time Synchronization (other time synchronization | 1. 802.1AS-based time synchronization (other time synchronization | |||
| techniques may also be used) | techniques may also be used) | |||
| 2. Interoperating with IEEE802.1Q bridges | 2. Interoperating with IEEE 802.1Q bridges | |||
| 3. Time-sensitive Traffic Stream Classification | 3. Time-sensitive traffic stream classification | |||
| The existing 802.11 TSN capabilities listed above, and the 802.11ax | The existing 802.11 TSN capabilities listed above, and the 802.11ax | |||
| OFDMA and AP-controlled access within a BSS provide a new set of | OFDMA and AP-controlled access within a BSS, provide a new set of | |||
| tools to better serve time-sensitive flows. However, it is important | tools to better serve time-sensitive flows. However, it is important | |||
| to understand the tradeoffs and constraints associated with such | to understand the trade-offs and constraints associated with such | |||
| capabilities, as well as redundancy and diversity mechanisms that can | capabilities, as well as redundancy and diversity mechanisms that can | |||
| be used to provide more predictable and reliable performance. | be used to provide more predictable and reliable performance. | |||
| 4.2.2.1. 802.11 Managed Network Operation and Admission Control | 4.2.2.1. 802.11 Managed Network Operation and Admission Control | |||
| Time-sensitive applications and TSN standards are expected to operate | Time-sensitive applications and TSN standards are expected to operate | |||
| in a managed network (e.g. industrial/enterprise network). This | in a managed network (e.g., an industrial/enterprise network). This | |||
| enables to carefully manage and integrate the Wi-Fi operation with | enables careful management and integration of the Wi-Fi operation | |||
| the overall TSN management framework, as defined in the | with the overall TSN management framework, as defined in | |||
| [IEEE802.1Qcc] specification. | [IEEE802.1Qcc]. | |||
| Some of the random-access latency and interference from legacy/ | Some of the random-access latency and interference from legacy/ | |||
| unmanaged devices can be reduced under a centralized management mode | unmanaged devices can be reduced under a centralized management mode | |||
| as defined in [IEEE802.1Qcc]. | as defined in [IEEE802.1Qcc]. | |||
| Existing traffic stream identification, configuration and admission | Existing traffic stream identification, configuration, and admission | |||
| control procedures defined in [IEEE Std 802.11] QoS mechanism can be | control procedures defined in the QoS mechanism in [IEEE802.11] can | |||
| re-used. However, given the high degree of determinism required by | be reused. However, given the high degree of determinism required by | |||
| many time-sensitive applications, additional capabilities to manage | many time-sensitive applications, additional capabilities to manage | |||
| interference and legacy devices within tight time-constraints need to | interference and legacy devices within tight time constraints need to | |||
| be explored. | be explored. | |||
| 4.2.2.2. Scheduling for Bounded Latency and Diversity | 4.2.2.2. Scheduling for Bounded Latency and Diversity | |||
| As discussed earlier, the [IEEE Std 802.11ax] OFDMA mode introduces | As discussed earlier, the OFDMA mode in [IEEE802.11ax] introduces the | |||
| the possibility of assigning different RUs (time/frequency resources) | possibility of assigning different RUs (time/frequency resources) to | |||
| to users within a PPDU. Several RU sizes are defined in the | users within a PPDU. Several RU sizes are defined in the | |||
| specification (26, 52, 106, 242, 484, 996 subcarriers). In addition, | specification (26, 52, 106, 242, 484, and 996 subcarriers). In | |||
| the AP can also decide on MCS (Modulation and Coding Scheme) and | addition, the AP can also decide on a Modulation and Coding Scheme | |||
| grouping of users within a given OFMDA PPDU. Such flexibility can be | (MCS) and grouping of users within a given OFMDA PPDU. Such | |||
| leveraged to support time-sensitive applications with bounded | flexibility can be leveraged to support time-sensitive applications | |||
| latency, especially in a managed network where stations can be | with bounded latency, especially in a managed network where stations | |||
| configured to operate under the control of the AP, in a controlled | can be configured to operate under the control of the AP, in a | |||
| environment (which contains only devices operating on the unlicensed | controlled environment (which contains only devices operating on the | |||
| band installed by the facility owner and where unexpected | unlicensed band installed by the facility owner and where unexpected | |||
| interference from other systems and/or radio access technologies only | interference from other systems and/or radio access technologies only | |||
| sporadically happens), or in a deployment where channel/link | sporadically happens), or in a deployment where channel and link | |||
| redundancy is used to reduce the impact of unmanaged devices/ | redundancy is used to reduce the impact of unmanaged devices and | |||
| interference. | interference. | |||
| When the network is lightly loaded, it is possible to achieve | When the network is lightly loaded, it is possible to achieve | |||
| latencies under 1 msec when Wi-Fi is operated in contention-based | latencies under 1 msec when Wi-Fi is operated in a contention-based | |||
| (i.e., without OFDMA) mode. It is also has been shown that it is | mode (i.e., without OFDMA). It also has been shown that it is | |||
| possible to achieve 1 msec latencies in controlled environment with | possible to achieve 1 msec latencies in a controlled environment with | |||
| higher efficiency when multi-user transmissions are used (enabled by | higher efficiency when multi-user transmissions are used (enabled by | |||
| OFDMA operation) [Cavalcanti_2019]. Obviously, there are latency, | OFDMA operation) [Cavalcanti_2019]. Obviously, there are latency, | |||
| reliability and capacity tradeoffs to be considered. For instance, | reliability, and capacity trade-offs to be considered. For instance, | |||
| smaller RUs result in longer transmission durations, which may impact | smaller RUs result in longer transmission durations, which may impact | |||
| the minimal latency that can be achieved, but the contention latency | the minimal latency that can be achieved, but the contention latency | |||
| and randomness elimination in an interference-free environment due to | and randomness elimination in an interference-free environment due to | |||
| multi-user transmission is a major benefit of the OFDMA mode. | multi-user transmission is a major benefit of the OFDMA mode. | |||
| The flexibility to dynamically assign RUs to each transmission also | The flexibility to dynamically assign RUs to each transmission also | |||
| enables the AP to provide frequency diversity, which can help | enables the AP to provide frequency diversity, which can help | |||
| increase reliability. | increase reliability. | |||
| 4.3. 802.11be Extreme High Throughput (EHT) | 4.3. 802.11be Extreme High Throughput (EHT) | |||
| 4.3.1. General Characteristics | 4.3.1. General Characteristics | |||
| The [IEEE 802.11be] ammendment was the next major 802.11 amendment | [IEEE802.11be] was the next major 802.11 amendment (after IEEE Std | |||
| (after IEEE Std 802.11ax-2021) for operation in the 2.4, 5 and 6 GHz | 802.11ax-2021) for operation in the 2.4, 5, and 6 GHz bands. 802.11be | |||
| bands. 802.11be includes new PHY and MAC features and it is targeting | includes new PHY and MAC features, and it is targeting extremely high | |||
| extremely high throughput (at least 30 Gbps), as well as enhancements | throughput (at least 30 Gbps), as well as enhancements to worst-case | |||
| to worst case latency and jitter. It is also expected to improve the | latency and jitter. It is also expected to improve the integration | |||
| integration with 802.1 TSN to support time-sensitive applications | with 802.1 TSN to support time-sensitive applications over Ethernet | |||
| over Ethernet and Wireless LANs. | and Wireless LANs. | |||
| The 802.11be main features relevant to this document include: | The main features of 802.11be that are relevant to this document | |||
| include: | ||||
| 1. 320MHz bandwidth and more efficient utilization of non-contiguous | 1. 320 MHz bandwidth and more efficient utilization of non- | |||
| spectrum. | contiguous spectrum | |||
| 2. Multi-link operation. | 2. Multi-Link Operation (MLO) | |||
| 3. QoS enhancements to reduce latency and increase reliability. | 3. QoS enhancements to reduce latency and increase reliability | |||
| 4.3.2. Applicability to Deterministic Flows | 4.3.2. Applicability to Deterministic Flows | |||
| The 802.11 Real-Time Applications (RTA) Topic Interest Group (TIG) | The 802.11 Real-Time Applications (RTA) Topic Interest Group (TIG) | |||
| provided detailed information on use cases, issues and potential | provided detailed information on use cases, issues, and potential | |||
| solution directions to improve support for time-sensitive | solution directions to improve support for time-sensitive | |||
| applications in 802.11. The RTA TIG report [IEEE_doc_11-18-2009-06] | applications in 802.11. The RTA TIG report [IEEE_doc_11-18-2009-06] | |||
| was used as input to the 802.11be project scope. | was used as input to the 802.11be project scope. | |||
| Improvements for worst-case latency, jitter and reliability were the | Improvements for worst-case latency, jitter, and reliability were the | |||
| main topics identified in the RTA report, which were motivated by | main topics identified in the RTA report, which were motivated by | |||
| applications in gaming, industrial automation, robotics, etc. The | applications in gaming, industrial automation, robotics, etc. The | |||
| RTA report also highlighted the need to support additional TSN | RTA report also highlighted the need to support additional TSN | |||
| capabilities, such as time-aware (802.1Qbv) shaping and packet | capabilities, such as time-aware (802.1Qbv) shaping and packet | |||
| replication and elimination as defined in 802.1CB. | replication and elimination as defined in 802.1CB. | |||
| IEEE Std 802.11be builds on and enhances 802.11ax capabilities to | IEEE Std 802.11be builds on and enhances 802.11ax capabilities to | |||
| improve worst case latency and jitter. Some of the enhancement areas | improve worst case latency and jitter. Some of the enhancement areas | |||
| are discussed next. | are discussed next. | |||
| 4.3.2.1. Enhanced Scheduled Operation for Bounded Latency | 4.3.2.1. Enhanced Scheduled Operation for Bounded Latency | |||
| In addition to the throughput enhancements, 802.11be leverages the | In addition to the throughput enhancements, 802.11be leverages the | |||
| trigger-based scheduled operation enabled by 802.11ax to provide | trigger-based scheduled operation enabled by 802.11ax to provide | |||
| efficient and more predictable medium access. | efficient and more predictable medium access. | |||
| 802.11be introduced QoS signaling enhancements, such as an additional | 802.11be introduced QoS signaling enhancements, such as an additional | |||
| QoS characteristics element, that enables STAs to provide detailed | QoS characteristics element, that enables stations to provide | |||
| information about deterministic traffic stream to the AP. This | detailed information about deterministic traffic stream to the AP. | |||
| capability helps AP implementations to better support scheduling for | This capability helps AP implementations to better support scheduling | |||
| deterministic flows. | for deterministic flows. | |||
| 4.3.2.2. Multi-link operation | 4.3.2.2. Multi-Link Operation | |||
| 802.11be introduces new features to improve operation over multiple | 802.11be introduces new features to improve operation over multiple | |||
| links and channels. By leveraging multiple links/channels, 802.11be | links and channels. By leveraging multiple links and channels, | |||
| can isolate time-sensitive traffic from network congestion, one of | 802.11be can isolate time-sensitive traffic from network congestion, | |||
| the main causes of large latency variations. In a managed 802.11be | one of the main causes of large latency variations. In a managed | |||
| network, it should be possible to steer traffic to certain links/ | 802.11be network, it should be possible to steer traffic to certain | |||
| channels to isolate time-sensitive traffic from other traffic and | links and channels to isolate time-sensitive traffic from other | |||
| help achieve bounded latency. The multi-link operation (MLO) is a | traffic and help achieve bounded latency. The Multi-Link Operation | |||
| major feature in the 802.11be amendment that can enhance latency and | (MLO) is a major feature in the 802.11be amendment that can enhance | |||
| reliability by enabling data frames to be duplicated across links. | latency and reliability by enabling data frames to be duplicated | |||
| across links. | ||||
| 4.4. 802.11ad and 802.11ay (mmWave operation) | 4.4. 802.11ad and 802.11ay (mmWave Operation) | |||
| 4.4.1. General Characteristics | 4.4.1. General Characteristics | |||
| The IEEE 802.11ad amendment defines PHY and MAC capabilities to | The IEEE 802.11ad amendment defines PHY and MAC capabilities to | |||
| enable multi-Gbps throughput in the 60 GHz millimeter wave (mmWave) | enable multi-Gbps throughput in the 60 GHz millimeter wave (mmWave) | |||
| band. The standard addresses the adverse mmWave signal propagation | band. The standard addresses the adverse mmWave signal propagation | |||
| characteristics and provides directional communication capabilities | characteristics and provides directional communication capabilities | |||
| that take advantage of beamforming to cope with increased | that take advantage of beamforming to cope with increased | |||
| attenuation. An overview of the 802.11ad standard can be found in | attenuation. An overview of the 802.11ad standard can be found in | |||
| [Nitsche_2015]. | [Nitsche_2015]. | |||
| The IEEE 802.11ay is currently developing enhancements to the | The IEEE 802.11ay is currently developing enhancements to the | |||
| 802.11ad standard to enable the next generation mmWave operation | 802.11ad standard to enable the next generation mmWave operation | |||
| targeting 100 Gbps throughput. Some of the main enhancements in | targeting 100 Gbps throughput. Some of the main enhancements in | |||
| 802.11ay include MIMO, channel bonding, improved channel access and | 802.11ay include MIMO, channel bonding, improved channel access, and | |||
| beamforming training. An overview of the 802.11ay capabilities can | beamforming training. An overview of the 802.11ay capabilities can | |||
| be found in [Ghasempour_2017]. | be found in [Ghasempour_2017]. | |||
| 4.4.2. Applicability to deterministic flows | 4.4.2. Applicability to Deterministic Flows | |||
| The high data rates achievable with 802.11ad and 802.11ay can | The high-data rates achievable with 802.11ad and 802.11ay can | |||
| significantly reduce latency down to microsecond levels. Limited | significantly reduce latency down to microsecond levels. Limited | |||
| interference from legacy and other unlicensed devices in 60 GHz is | interference from legacy and other unlicensed devices in 60 GHz is | |||
| also a benefit. However, directionality and short range typical in | also a benefit. However, the directionality and short range typical | |||
| mmWave operation impose new challenges such as the overhead required | in mmWave operation impose new challenges such as the overhead | |||
| for beam training and blockage issues, which impact both latency and | required for beam training and blockage issues, which impact both | |||
| reliability. Therefore, it is important to understand the use case | latency and reliability. Therefore, it is important to understand | |||
| and deployment conditions in order to properly apply and configure | the use case and deployment conditions in order to properly apply and | |||
| 802.11ad/ay networks for time sensitive applications. | configure 802.11ad/ay networks for time-sensitive applications. | |||
| The 802.11ad standard includes a scheduled access mode in which the | The 802.11ad standard includes a scheduled access mode in which the | |||
| central controller, after contending and reserving the channel for a | central controller, after contending and reserving the channel for a | |||
| dedicated period, can allocate to stations contention-free service | dedicated period, can allocate to stations contention-free service | |||
| periods. This scheduling capability is also available in 802.11ay, | periods. This scheduling capability is also available in 802.11ay, | |||
| and it is one of the mechanisms that can be used to provide bounded | and it is one of the mechanisms that can be used to provide bounded | |||
| latency to time-sensitive data flows in interference-free scenarios. | latency to time-sensitive data flows in interference-free scenarios. | |||
| An analysis of the theoretical latency bounds that can be achieved | An analysis of the theoretical latency bounds that can be achieved | |||
| with 802.11ad service periods is provided in [Cavalcanti_2019]. | with 802.11ad service periods is provided in [Cavalcanti_2019]. | |||
| 5. IEEE 802.15.4 Timeslotted Channel Hopping | 5. IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) | |||
| IEEE Std 802.15.4 TSCH was the first IEEE radio specification aimed | IEEE Std 802.15.4 TSCH was the first IEEE radio specification aimed | |||
| directly at Industrial IoT applications, for use in Process Control | directly at industrial IoT applications, for use in process control | |||
| loops and monitoring. It was used as a base for the major industrial | loops and monitoring. It was used as a base for the major industrial | |||
| wireless process control standards, Wireless HART and ISA100.11a. | wireless process control standards, Wireless Highway Addressable | |||
| Remote Transducer Protocol (HART) and ISA100.11a. | ||||
| While the MAC/PHY standards enable the relatively slow rates used in | While the MAC/PHY standards enable the relatively slow rates used in | |||
| Process Control (typically in the order of 4-5 per second), the | process control (typically in the order of 4-5 per second), the | |||
| technology is not suited for the faster periods (1 to 10ms) used in | technology is not suited for the faster periods used in factory | |||
| Factory Automation and motion control. | automation and motion control (1 to 10 ms). | |||
| 5.1. Provenance and Documents | 5.1. Provenance and Documents | |||
| The IEEE802.15.4 Task Group has been driving the development of low- | The IEEE 802.15.4 Task Group has been driving the development of low- | |||
| power low-cost radio technology. The IEEE802.15.4 physical layer has | power, low-cost radio technology. The IEEE 802.15.4 physical layer | |||
| been designed to support demanding low-power scenarios targeting the | has been designed to support demanding low-power scenarios targeting | |||
| use of unlicensed bands, both the 2.4 GHz and sub GHz Industrial, | the use of unlicensed bands, both the 2.4 GHz and sub-GHz Industrial, | |||
| Scientific and Medical (ISM) bands. This has imposed requirements in | Scientific and Medical (ISM) bands. This has imposed requirements in | |||
| terms of frame size, data rate and bandwidth to achieve reduced | terms of frame size, data rate, and bandwidth to achieve reduced | |||
| collision probability, reduced packet error rate, and acceptable | collision probability, reduced packet error rate, and acceptable | |||
| range with limited transmission power. The PHY layer supports frames | range with limited transmission power. The PHY layer supports frames | |||
| of up to 127 bytes. The Medium Access Control (MAC) sublayer | of up to 127 bytes. The Medium Access Control (MAC) sublayer | |||
| overhead is in the order of 10-20 bytes, leaving about 100 bytes to | overhead is in the order of 10-20 bytes, leaving about 100 bytes to | |||
| the upper layers. IEEE802.15.4 uses spread spectrum modulation such | the upper layers. IEEE 802.15.4 uses spread spectrum modulation such | |||
| as the Direct Sequence Spread Spectrum (DSSS). | as the Direct Sequence Spread Spectrum (DSSS). | |||
| The Timeslotted Channel Hopping (TSCH) mode was added to the 2015 | The Time-Slotted Channel Hopping (TSCH) mode was added to the 2015 | |||
| revision of the IEEE802.15.4 standard [IEEE Std 802.15.4]. TSCH is | revision of the IEEE 802.15.4 standard [IEEE802.15.4]. TSCH is | |||
| targeted at the embedded and industrial world, where reliability, | targeted at the embedded and industrial world, where reliability, | |||
| energy consumption and cost drive the application space. | energy consumption, and cost drive the application space. | |||
| Time sensitive networking on low power constrained wireless networks, | Building on IEEE 802.15.4, TSN on low-power constrained wireless | |||
| building on IEEE802.15.4, have been partially addressed by ISA100.11a | networks has been partially addressed by ISA100.11a [ISA100.11a] and | |||
| [ISA100.11a] and WirelessHART [WirelessHART]. Both technologies | WirelessHART [WirelessHART]. Both technologies involve a central | |||
| involve a central controller that computes redundant paths for | controller that computes redundant paths for industrial process | |||
| industrial process control traffic over a TSCH mesh. Moreover, | control traffic over a TSCH mesh. Moreover, ISA100.11a introduces | |||
| ISA100.11a introduces IPv6 [RFC8200] capabilities with a Link-Local | IPv6 capabilities [RFC8200] with a link-local address for the join | |||
| Address for the join process and a global unicast address for later | process and a global unicast address for later exchanges, but the | |||
| exchanges, but the IPv6 traffic typically ends at a local application | IPv6 traffic typically ends at a local application gateway and the | |||
| gateway and the full power of IPv6 for end-to-end communication is | full power of IPv6 for end-to-end communication is not enabled. | |||
| not enabled. | ||||
| At the IETF, the 6TiSCH working group [TiSCH] has enabled distributed | At the IETF, the 6TiSCH Working Group [TiSCH] has enabled distributed | |||
| routing and scheduling to exploit the deterministic access | routing and scheduling to exploit the deterministic access | |||
| capabilities provided by TSCH for IPv6. The group designed the | capabilities provided by TSCH for IPv6. The group designed the | |||
| essential mechanisms, the 6top layer and the Scheduling Functions | essential mechanisms, the 6TiSCH Operation (6top) sublayer and the | |||
| (SFs), to enable the management plane operation while ensuring IPv6 | Scheduling Functions (SFs), to enable the management plane operation | |||
| is supported: | while ensuring IPv6 is supported. | |||
| * The 6top Protocol (6P) defined in [RFC8480]. The 6P Protocol | * The 6top Protocol (6P) is defined in [RFC8480] and provides a | |||
| provides a pairwise negotiation mechanism to the control plane | pairwise negotiation mechanism to the control plane operation. | |||
| operation. The protocol supports agreement on a schedule between | The protocol supports agreement on a schedule between neighbors, | |||
| neighbors, enabling distributed scheduling. | enabling distributed scheduling. | |||
| * 6P goes hand-in-hand with an SF, the policy that decides how to | * 6P goes hand in hand with an SF, the policy that decides how to | |||
| maintain cells and trigger 6P transactions. The Minimal | maintain cells and trigger 6P transactions. The Minimal | |||
| Scheduling Function (MSF) [RFC9033] is the default SF defined by | Scheduling Function (MSF) [RFC9033] is the default SF defined by | |||
| the 6TiSCH WG. | the 6TiSCH WG. | |||
| * With these mechanisms 6TiSCH can establish layer 2 links between | * With these mechanisms, 6TiSCH can establish Layer 2 links between | |||
| neighbouring nodes and support best effort traffic. RPL [RFC8480] | neighboring nodes and support best-effort traffic. The Routing | |||
| provides the routing structure, enabling the 6TiSCH devices to | Protocol for Low-Power and Lossy Networks (RPL) [RFC8480] provides | |||
| establish the links with well connected neighbours and thus | the routing structure, enabling the 6TiSCH devices to establish | |||
| forming the acyclic network graphs. | the links with well-connected neighbors, thus forming the acyclic | |||
| network graphs. | ||||
| A Track at 6TiSCH is the application to wireless of the concept of a | A Track at 6TiSCH is the application to wireless of the concept of a | |||
| Recovery Graph in the RAW architecture. A Track can follow a simple | recovery graph in the RAW architecture. A Track can follow a simple | |||
| sequence of relay nodes or can be structured as a more complex | sequence of relay nodes, or it can be structured as a more complex | |||
| Destination Oriented Directed Acyclic Graph (DODAG) to a unicast | Destination-Oriented Directed Acyclic Graph (DODAG) to a unicast | |||
| destination. Along a Track, 6TiSCH nodes reserve the resources to | destination. Along a Track, 6TiSCH nodes reserve the resources to | |||
| enable the efficient transmission of packets while aiming to optimize | enable the efficient transmission of packets while aiming to optimize | |||
| certain properties such as reliability and ensure small jitter or | certain properties such as reliability and ensure small jitter or | |||
| bounded latency. The Track structure enables Layer-2 forwarding | bounded latency. The Track structure enables Layer 2 forwarding | |||
| schemes, reducing the overhead of taking routing decisions at the | schemes, reducing the overhead of making routing decisions at Layer | |||
| Layer-3. | 3. | |||
| The 6TiSCH architecture [RFC9030] identifies different models to | The 6TiSCH architecture [RFC9030] identifies different models to | |||
| schedule resources along so-called Tracks (see Section 5.2.1) | schedule resources along so-called Tracks (see Section 5.2.1), | |||
| exploiting the TSCH schedule structure however the focus at 6TiSCH is | exploiting the TSCH schedule structure; however, the focus in 6TiSCH | |||
| on best effort traffic and the group was never chartered to produce | is on best-effort traffic, and the group was never chartered to | |||
| standard work related to Tracks. | produce standards work related to Tracks. | |||
| There are several works that can be used to complement the overview | There are several works that can be used to complement the overview | |||
| provided in this document. For example [vilajosana21] provides a | provided in this document. For example, [vilajosana21] provides a | |||
| detailed description of the 6TiSCH protocols, how they are linked | detailed description of the 6TiSCH protocols, how they are linked | |||
| together and how they are integrated with other standards like RPL | together, and how they are integrated with other standards like RPL | |||
| and 6Lo. | and 6Lo. | |||
| 5.2. General Characteristics | 5.2. General Characteristics | |||
| As a core technique in IEEE802.15.4, TSCH splits time in multiple | As a core technique in IEEE 802.15.4, TSCH splits time in multiple | |||
| time slots that repeat over time. Each device has its own | time slots that repeat over time. Each device has its own | |||
| perspective of when the send or receive and on which channel the | perspective of when the send or receive occurs and on which channel | |||
| transmission happens. This constitutes the device's Slotframe where | the transmission happens. This constitutes the device's Slotframe, | |||
| the channel and destination of a transmission by this device are a | where the channel and destination of a transmission by this device | |||
| function of time. The overall aggregation of all the Slotframes of | are a function of time. The overall aggregation of all the | |||
| all the devices constitutes a time/frequency matrix with at most one | Slotframes of all the devices constitutes a time/frequency matrix | |||
| transmission in each cell of the matrix (more in Section 5.3.1.4). | with at most one transmission in each cell of the matrix (see more in | |||
| Section 5.3.1.4). | ||||
| The IEEE 802.15.4 TSCH standard does not define any scheduling | The IEEE 802.15.4 TSCH standard does not define any scheduling | |||
| mechanism but only provides the architecture that establishes a | mechanism but only provides the architecture that establishes a | |||
| slotted structure that can be managed by a proper schedule. This | slotted structure that can be managed by a proper schedule. This | |||
| schedule represents the possible communications of a node with its | schedule represents the possible communications of a node with its | |||
| neighbors, and is managed by a Scheduling Function such as the | neighbors and is managed by a Scheduling Function such as the Minimal | |||
| Minimal Scheduling Function (MSF) [RFC9033]. In MSF, each cell in | Scheduling Function (MSF) [RFC9033]. In MSF, each cell in the | |||
| the schedule is identified by its slotoffset and channeloffset | schedule is identified by its slotoffset and channeloffset | |||
| coordinates. A cell's timeslot offset indicates its position in | coordinates. A cell's timeslot offset indicates its position in | |||
| time, relative to the beginning of the slotframe. A cell's channel | time, relative to the beginning of the slotframe. A cell's channel | |||
| offset is an index which maps to a frequency at each iteration of the | offset is an index that maps to a frequency at each iteration of the | |||
| slotframe. Each packet exchanged between neighbors happens within | slotframe. Each packet exchanged between neighbors happens within | |||
| one cell. The size of a cell is a timeslot duration, between 10 to | one cell. The size of a cell is a timeslot duration, between 10 to | |||
| 15 milliseconds. An Absolute Slot Number (ASN) indicates the number | 15 milliseconds. An Absolute Slot Number (ASN) indicates the number | |||
| of slots elapsed since the network started. It increments at every | of slots elapsed since the network started. It increments at every | |||
| slot. This is a 5-byte counter that can support networks running for | slot. This is a 5-byte counter that can support networks running for | |||
| more than 300 years without wrapping (assuming a 10-ms timeslot). | more than 300 years without wrapping (assuming a 10 ms timeslot). | |||
| Channel hopping provides increased reliability to multi-path fading | Channel hopping provides increased reliability to multipath fading | |||
| and external interference. It is handled by TSCH through a channel | and external interference. It is handled by TSCH through a channel- | |||
| hopping sequence referred as macHopSeq in the IEEE802.15.4 | hopping sequence referred to as macHopSeq in the IEEE 802.15.4 | |||
| specification. | specification. | |||
| The Time-Frequency Division Multiple Access provided by TSCH enables | The Time-Frequency Division Multiple Access provided by TSCH enables | |||
| the orchestration of traffic flows, spreading them in time and | the orchestration of traffic flows, spreading them in time and | |||
| frequency, and hence enabling an efficient management of the | frequency, and hence enabling an efficient management of the | |||
| bandwidth utilization. Such efficient bandwidth utilization can be | bandwidth utilization. Such efficient bandwidth utilization can be | |||
| combined with OFDM modulations also supported by the IEEE802.15.4 | combined with OFDM modulations also supported by the IEEE 802.15.4 | |||
| standard [IEEE Std 802.15.4] since the 2015 version. | standard [IEEE802.15.4] since the 2015 version. | |||
| TSCH networks operate in ISM bands in which the spectrum is shared by | TSCH networks operate in ISM bands in which the spectrum is shared by | |||
| different coexisting technologies. Regulations such as FCC, ETSI and | different coexisting technologies. Regulations such as the FCC, | |||
| ARIB impose duty cycle regulations to limit the use of the bands but | ETSI, and ARIB impose duty cycle regulations to limit the use of the | |||
| yet interference may constraint the probability to deliver a packet. | bands, but interference may still constrain the probability of | |||
| Part of these reliability challenges are addressed at the MAC | delivering a packet. Part of these reliability challenges are | |||
| introducing redundancy and diversity, thanks to channel hopping, | addressed at the MAC introducing redundancy and diversity, thanks to | |||
| scheduling and ARQ policies. Yet, the MAC layer operates with a | channel hopping, scheduling, and ARQ policies. Yet, the MAC layer | |||
| 1-hop vision, being limited to local actions to mitigate | operates with a 1-hop vision, being limited to local actions to | |||
| underperforming links. | mitigate underperforming links. | |||
| 5.2.1. 6TiSCH Tracks | 5.2.1. 6TiSCH Tracks | |||
| A Track in the 6TiSCH Architecture [RFC9030] is the application to | A Track in the 6TiSCH architecture [RFC9030] is the application to | |||
| 6TiSCH networks of the concept of a protection path in the "Detnet | 6TiSCH networks of the concept of a protection path in the DetNet | |||
| architecture" [RFC8655]. A Track can be structured as a Destination | architecture [RFC8655]. A Track can be structured as a Destination- | |||
| Oriented Directed Acyclic Graph (DODAG) to a destination for unicast | Oriented Directed Acyclic Graph (DODAG) to a destination for unicast | |||
| traffic. Along a Track, 6TiSCH nodes reserve the resources to enable | traffic. Along a Track, 6TiSCH nodes reserve the resources to enable | |||
| the efficient transmission of packets while aiming to optimize | the efficient transmission of packets while aiming to optimize | |||
| certain properties such as reliability and ensure small jitter or | certain properties such as reliability and ensure small jitter or | |||
| bounded latency. The Track structure enables Layer-2 forwarding | bounded latency. The Track structure enables Layer 2 forwarding | |||
| schemes, reducing the overhead of taking routing decisions at the | schemes, reducing the overhead of making routing decisions at Layer | |||
| Layer-3. | 3. | |||
| Serial Tracks can be understood as the concatenation of cells or | Serial Tracks can be understood as the concatenation of cells or | |||
| bundles along a routing path from a source towards a destination. | bundles along a routing path from a source towards a destination. | |||
| The serial Track concept is analogous to the circuit concept where | The serial Track concept is analogous to the circuit concept where | |||
| resources are chained into a multi-hop topology, more in | resources are chained into a multi-hop topology; see more in | |||
| Section 5.2.1.2 on how that is used in the data plane to forward | Section 5.2.1.2 on how that is used in the data plane to forward | |||
| packets. | packets. | |||
| Whereas scheduling ensures reliable delivery in bounded time along | Whereas scheduling ensures reliable delivery in bounded time along | |||
| any Track, high availability requires the application of PREOF | any Track, high availability requires the application of PREOF | |||
| functions along a more complex DODAG Track structure. A DODAG has | functions along a more complex DODAG Track structure. A DODAG has | |||
| forking and joining nodes where the concepts such as Replication and | forking and joining nodes where concepts like replication and | |||
| Elimination can be exploited. Spatial redundancy increases the | elimination can be exploited. Spatial redundancy increases the | |||
| overall energy consumption in the network but improves significantly | overall energy consumption in the network but significantly improves | |||
| the availability of the network as well as the packet delivery ratio. | the availability of the network as well as the packet delivery ratio. | |||
| A Track may also branch off and rejoin, for the purpose of the so- | A Track may also branch off and rejoin, for the purpose of so-called | |||
| called Packet Replication and Elimination (PRE), over non congruent | Packet Replication and Elimination (PRE), over non-congruent | |||
| branches. PRE may be used to complement layer-2 ARQ and receiver-end | branches. PRE may be used to complement Layer 2 ARQ and receiver-end | |||
| Ordering to complete/extend the PREOF functions. This enables | ordering to complete/extend the PREOF functions. This enables | |||
| meeting industrial expectations of packet delivery within bounded | meeting industrial expectations of packet delivery within bounded | |||
| delay over a Track that includes wireless links, even when the Track | delay over a Track that includes wireless links, even when the Track | |||
| extends beyond the 6TiSCH network. | extends beyond the 6TiSCH network. | |||
| The RAW Track described in the RAW Architecture | The RAW Track described in the RAW architecture [RFC9912] inherits | |||
| [I-D.ietf-raw-architecture] inherits directly from that model. RAW | directly from that model. RAW extends the graph beyond a DODAG as | |||
| extends the graph beyond a DODAG as long as a given packet cannot | long as a given packet cannot loop within the Track. | |||
| loop within the Track. | ||||
| +-----+ | +-----+ | |||
| | IoT | | | IoT | | |||
| | G/W | | | G/W | | |||
| +-----+ | +-----+ | |||
| ^ <---- Elimination | ^ <---- Elimination | |||
| | | | | | | |||
| Track branch | | | Track branch | | | |||
| +-------+ +--------+ Subnet Backbone | +-------+ +--------+ Subnet backbone | |||
| | | | | | | |||
| +--|--+ +--|--+ | +--|--+ +--|--+ | |||
| | | | Backbone | | | Backbone | | | | Backbone | | | Backbone | |||
| o | | | router | | | router | o | | | router | | | router | |||
| +--/--+ +--|--+ | +--/--+ +--|--+ | |||
| o / o o---o----/ o | o / o o---o----/ o | |||
| o o---o--/ o o o o o | o o---o--/ o o o o o | |||
| o \ / o o LLN o | o \ / o o LLN o | |||
| o v <---- Replication | o v <---- Replication | |||
| o | o | |||
| Figure 1: End-to-End deterministic Track | Figure 1: End-to-End Deterministic Track | |||
| In the example above (see Figure 1), a Track is laid out from a field | In Figure 1, a Track is laid out from a field device in a 6TiSCH | |||
| device in a 6TiSCH network to an IoT gateway that is located on a | network to an IoT gateway that is located on an IEEE 802.1 TSN | |||
| IEEE802.1 TSN backbone. | backbone. | |||
| The Replication function in the field device sends a copy of each | The Replication function in the field device sends a copy of each | |||
| packet over two different branches, and a PCE schedules each hop of | packet over two different branches, and a PCE schedules each hop of | |||
| both branches so that the two copies arrive in due time at the | both branches so that the two copies arrive in due time at the | |||
| gateway. In case of a loss on one branch, hopefully the other copy | gateway. In case of a loss on one branch, hopefully the other copy | |||
| of the packet still makes it in due time. If two copies make it to | of the packet still makes it in due time. If two copies make it to | |||
| the IoT gateway, the Elimination function in the gateway ignores the | the IoT gateway, the Elimination function in the gateway ignores the | |||
| extra packet and presents only one copy to upper layers. | extra packet and presents only one copy to upper layers. | |||
| At each 6TiSCH hop along the Track, the PCE may schedule more than | At each 6TiSCH hop along the Track, the PCE may schedule more than | |||
| one timeSlot for a packet, so as to support Layer-2 retries (ARQ). | one timeSlot for a packet, so as to support Layer 2 retries (ARQ). | |||
| It is also possible that the field device only uses the second branch | It is also possible for the field device to only use the second | |||
| if sending over the first branch fails. | branch if sending over the first branch fails. | |||
| In current deployments, a TSCH Track does not necessarily support PRE | In current deployments, a TSCH Track does not necessarily support PRE | |||
| but is systematically multi-path. This means that a Track is | but is systematically multipath. This means that a Track is | |||
| scheduled so as to ensure that each hop has at least two forwarding | scheduled so as to ensure that each hop has at least two forwarding | |||
| solutions, and the forwarding decision is to try the preferred one | solutions, and the forwarding decision is to try the preferred one | |||
| and use the other in case of Layer-2 transmission failure as detected | and use the other in case of Layer 2 transmission failure as detected | |||
| by ARQ. | by ARQ. | |||
| Methods to implement complex Tracks are described in | Methods to implement complex Tracks are described in [RFC9914] and | |||
| [I-D.ietf-roll-dao-projection] and complemented by extensions to the | complemented by extensions to the RPL routing protocol in [NSA-EXT] | |||
| RPL routing protocol in [I-D.ietf-roll-nsa-extension] for best effort | for best-effort traffic, but a centralized routing technique such as | |||
| traffic, but a centralized routing technique such as promoted in | one promoted in DetNet is still missing. | |||
| DetNet is still missing. | ||||
| 5.2.1.1. Track Scheduling Protocol | 5.2.1.1. Track Scheduling Protocol | |||
| Section "Schedule Management Mechanisms" of the 6TiSCH architecture | Section 4.4 of the 6TiSCH architecture [RFC9030] describes four | |||
| describes 4 approaches to manage the TSCH schedule of the LLN nodes: | approaches to manage the TSCH schedule of the Low-Power and Lossy | |||
| Static Scheduling, neighbor-to-neighbor Scheduling, remote monitoring | Network (LLN) nodes: static scheduling, neighbor-to-neighbor | |||
| and scheduling management, and Hop-by-hop scheduling. The Track | scheduling, remote monitoring and scheduling management, and hop-by- | |||
| operation for DetNet corresponds to a remote monitoring and | hop scheduling. The Track operation for DetNet corresponds to a | |||
| scheduling management by a PCE. | remote monitoring and scheduling management by a PCE. | |||
| 5.2.1.2. Track Forwarding | 5.2.1.2. Track Forwarding | |||
| By forwarding, the 6TiSCH Architecture [RFC9030] means the per-packet | In the 6TiSCH architecture [RFC9030], forwarding is the per-packet | |||
| operation that allows delivering a packet to a next hop or an upper | operation that allows a packet to be delivered to a next hop or an | |||
| layer in this node. Forwarding is based on pre-existing state that | upper layer in a node. Forwarding is based on preexisting state that | |||
| was installed as a result of the routing computation of a Track by a | was installed as a result of the routing computation of a Track by a | |||
| PCE. The 6TiSCH architecture supports three different forwarding | PCE. The 6TiSCH architecture supports three different forwarding | |||
| model, G-MPLS Track Forwarding (TF), 6LoWPAN Fragment Forwarding (FF) | models: GMPLS Track Forwarding (TF), 6LoWPAN Fragment Forwarding | |||
| and IPv6 Forwarding (6F) which is the classical IP operation | (FF), and IPv6 Forwarding (6F), which is the classical IP operation | |||
| [RFC9030]. The DetNet case relates to the Track Forwarding operation | [RFC9030]. The DetNet case relates to the Track Forwarding operation | |||
| under the control of a PCE. | under the control of a PCE. | |||
| A Track is a unidirectional path between a source and a destination. | A Track is a unidirectional path between a source and a destination. | |||
| Time/Frequency resources called cells (see Section 5.3.1.4) are | Time and frequency resources called cells (see Section 5.3.1.4) are | |||
| allocated to enable the forwarding operation along the Track. In a | allocated to enable the forwarding operation along the Track. In a | |||
| Track cell, the normal operation of IEEE802.15.4 ARQ usually happens, | Track cell, the normal operation of IEEE 802.15.4 ARQ usually | |||
| though the acknowledgment may be omitted in some cases, for instance | happens, though the acknowledgment may be omitted in some cases, for | |||
| if there is no scheduled cell for a retry. | instance, if there is no scheduled cell for a retry. | |||
| Track Forwarding is the simplest and fastest. A bundle of cells set | Track Forwarding is the simplest and fastest. A bundle of cells set | |||
| to receive (RX-cells) is uniquely paired to a bundle of cells that | to receive (RX-cells) is uniquely paired to a bundle of cells that | |||
| are set to transmit (TX-cells), representing a layer-2 forwarding | are set to transmit (TX-cells), representing a Layer 2 forwarding | |||
| state that can be used regardless of the network layer protocol. | state that can be used regardless of the network-layer protocol. | |||
| This model can effectively be seen as a Generalized Multi-protocol | This model can effectively be seen as a Generalized Multiprotocol | |||
| Label Switching (G-MPLS) operation in that the information used to | Label Switching (GMPLS) operation in that the information used to | |||
| switch a frame is not an explicit label, but rather related to other | switch a frame is not an explicit label but is rather related to | |||
| properties of the way the packet was received, a particular cell in | other properties about the way the packet was received (a particular | |||
| the case of 6TiSCH. As a result, as long as the TSCH MAC (and | cell, in the case of 6TiSCH). As a result, as long as the TSCH MAC | |||
| Layer-2 security) accepts a frame, that frame can be switched | (and Layer 2 security) accepts a frame, that frame can be switched | |||
| regardless of the protocol, whether this is an IPv6 packet, a 6LoWPAN | regardless of the protocol, whether this is an IPv6 packet, a 6LoWPAN | |||
| fragment, or a frame from an alternate protocol such as WirelessHART | fragment, or a frame from an alternate protocol such as WirelessHART | |||
| or ISA100.11a. | or ISA100.11a. | |||
| A data frame that is forwarded along a Track normally has a | A data frame that is forwarded along a Track normally has a | |||
| destination MAC address that is set to broadcast - or a multicast | destination MAC address that is set to broadcast (or a multicast | |||
| address depending on MAC support. This way, the MAC layer in the | address, depending on MAC support). This way, the MAC layer in the | |||
| intermediate nodes accepts the incoming frame and 6top switches it | intermediate nodes accepts the incoming frame, and 6top switches it | |||
| without incurring a change in the MAC header. In the case of | without incurring a change in the MAC header. In the case of IEEE | |||
| IEEE802.15.4, this means effectively broadcast, so that along the | 802.15.4, this means effectively broadcast, so that the short address | |||
| Track the short address for the destination of the frame is set to | for the destination of the frame is set to 0xFFFF along the Track. | |||
| 0xFFFF. | ||||
| A Track is thus formed end-to-end as a succession of paired bundles, | A Track is thus formed end to end as a succession of paired bundles: | |||
| a receive bundle from the previous hop and a transmit bundle to the | a receive bundle from the previous hop and a transmit bundle to the | |||
| next hop along the Track, and a cell in such a bundle belongs to at | next hop along the Track. A cell in such a bundle belongs to one | |||
| most one Track. For a given iteration of the device schedule, the | Track at most. For a given iteration of the device schedule, the | |||
| effective channel of the cell is obtained by adding a pseudo-random | effective channel of the cell is obtained by adding a pseudorandom | |||
| number to the channelOffset of the cell, which results in a rotation | number to the channelOffset of the cell, which results in a rotation | |||
| of the frequency that used for transmission. The bundles may be | of the frequency that was used for transmission. The bundles may be | |||
| computed so as to accommodate both variable rates and | computed so as to accommodate both variable rates and | |||
| retransmissions, so they might not be fully used at a given iteration | retransmissions, so they might not be fully used at a given iteration | |||
| of the schedule. The 6TiSCH architecture provides additional means | of the schedule. The 6TiSCH architecture provides additional means | |||
| to avoid waste of cells as well as overflows in the transmit bundle, | to avoid waste of cells as well as overflows in the transmit bundle, | |||
| as follows: | as described in the following paragraphs. | |||
| In one hand, a TX-cell that is not needed for the current iteration | On one hand, a TX-cell that is not needed for the current iteration | |||
| may be reused opportunistically on a per-hop basis for routed | may be reused opportunistically on a per-hop basis for routed | |||
| packets. When all of the frame that were received for a given Track | packets. When all of the frames that were received for a given Track | |||
| are effectively transmitted, any available TX-cell for that Track can | are effectively transmitted, any available TX-cell for that Track can | |||
| be reused for upper layer traffic for which the next-hop router | be reused for upper-layer traffic for which the next-hop router | |||
| matches the next hop along the Track. In that case, the cell that is | matches the next hop along the Track. In that case, the cell that is | |||
| being used is effectively a TX-cell from the Track, but the short | being used is effectively a TX-cell from the Track, but the short | |||
| address for the destination is that of the next-hop router. It | address for the destination is that of the next-hop router. It | |||
| results that a frame that is received in a RX-cell of a Track with a | results that a frame that is received in an RX-cell of a Track with a | |||
| destination MAC address set to this node as opposed to broadcast must | destination MAC address set to this node as opposed to broadcast must | |||
| be extracted from the Track and delivered to the upper layer (a frame | be extracted from the Track and delivered to the upper layer (a frame | |||
| with an unrecognized MAC address is dropped at the lower MAC layer | with an unrecognized MAC address is dropped at the lower MAC layer | |||
| and thus is not received at the 6top sublayer). | and thus is not received at the 6top sublayer). | |||
| On the other hand, it might happen that there are not enough TX-cells | On the other hand, it might happen that there are not enough TX-cells | |||
| in the transmit bundle to accommodate the Track traffic, for instance | in the transmit bundle to accommodate the Track traffic, for | |||
| if more retransmissions are needed than provisioned. In that case, | instance, if more retransmissions are needed than provisioned. In | |||
| the frame can be placed for transmission in the bundle that is used | that case, the frame can be placed for transmission in the bundle | |||
| for layer-3 traffic towards the next hop along the Track as long as | that is used for Layer 3 traffic towards the next hop along the Track | |||
| it can be routed by the upper layer, that is, typically, if the frame | as long as it can be routed by the upper layer, that is, typically, | |||
| transports an IPv6 packet. The MAC address should be set to the | if the frame transports an IPv6 packet. The MAC address should be | |||
| next-hop MAC address to avoid confusion. It results that a frame | set to the next-hop MAC address to avoid confusion. It results that | |||
| that is received over a layer-3 bundle may be in fact associated with | a frame that is received over a Layer 3 bundle may be in fact | |||
| a Track. In a classical IP link such as an Ethernet, off-Track | associated with a Track. In a classical IP link such as an Ethernet, | |||
| traffic is typically in excess over reservation to be routed along | off-Track traffic is typically in excess over reservation to be | |||
| the non-reserved path based on its QoS setting. But with 6TiSCH, | routed along the non-reserved path based on its QoS setting. | |||
| since the use of the layer-3 bundle may be due to transmission | However, with 6TiSCH, since the use of the Layer 3 bundle may be due | |||
| failures, it makes sense for the receiver to recognize a frame that | to transmission failures, it makes sense for the receiver to | |||
| should be re-Tracked, and to place it back on the appropriate bundle | recognize a frame that should be re-Tracked and to place it back on | |||
| if possible. A frame should be re-Tracked if the Per-Hop-Behavior | the appropriate bundle if possible. A frame should be re-Tracked if | |||
| group indicated in the Differentiated Services Field in the IPv6 | the per-hop-behavior group indicated in the Differentiated Services | |||
| header is set to Deterministic Forwarding, as discussed in | field in the IPv6 header is set to deterministic forwarding, as | |||
| Section 5.3.1.1. A frame is re-Tracked by scheduling it for | discussed in Section 5.3.1.1. A frame is re-Tracked by scheduling it | |||
| transmission over the transmit bundle associated with the Track, with | for transmission over the transmit bundle associated with the Track, | |||
| the destination MAC address set to broadcast. | with the destination MAC address set to broadcast. | |||
| 5.2.1.2.1. OAM | 5.2.1.2.1. OAM | |||
| "An Overview of Operations, Administration, and Maintenance (OAM) | "An Overview of Operations, Administration, and Maintenance (OAM) | |||
| Tools" [RFC7276] provides an overview of the existing tooling for OAM | Tools" [RFC7276] provides an overview of the existing tooling for OAM | |||
| [RFC6291]. Tracks are complex paths and new tooling is necessary to | [RFC6291]. Tracks are complex paths and new tooling is necessary to | |||
| manage them, with respect to load control, timing, and the Packet | manage them, with respect to load control, timing, and the Packet | |||
| Replication and Elimination Functions (PREF). | Replication and Elimination Functions (PREF). | |||
| An example of such tooling can be found in the context of BIER | An example of such tooling can be found in the context of Bit Index | |||
| [RFC8279] and more specifically BIER Traffic Engineering [RFC9262] | Explicit Replication (BIER) [RFC8279] and, more specifically, BIER | |||
| (BIER-TE). | Traffic Engineering (BIER-TE) [RFC9262]. | |||
| 5.3. Applicability to Deterministic Flows | 5.3. Applicability to Deterministic Flows | |||
| In the RAW context, low power reliable networks should address non- | In the RAW context, low-power reliable networks should address non- | |||
| critical control scenarios such as Class 2 and monitoring scenarios | critical control scenarios such as Class 2 and monitoring scenarios | |||
| such as Class 4 defined by the RFC5673 [RFC5673]. As a low power | such as Class 4, as defined by [RFC5673]. As a low-power technology | |||
| technology targeting industrial scenarios radio transducers provide | targeting industrial scenarios, radio transducers provide low data | |||
| low data rates (typically between 50kbps to 250kbps) and robust | rates (typically between 50 kbps to 250 kbps) and robust modulations | |||
| modulations to trade-off performance to reliability. TSCH networks | to trade-off performance to reliability. TSCH networks are organized | |||
| are organized in mesh topologies and connected to a backbone. | in mesh topologies and connected to a backbone. Latency in the mesh | |||
| Latency in the mesh network is mainly influenced by propagation | network is mainly influenced by propagation aspects such as | |||
| aspects such as interference. ARQ methods and redundancy techniques | interference. ARQ methods and redundancy techniques such as | |||
| such as replication and elimination should be studied to provide the | replication and elimination should be studied to provide the needed | |||
| needed performance to address deterministic scenarios. | performance to address deterministic scenarios. | |||
| Nodes in a TSCH network are tightly synchronized. This enables | Nodes in a TSCH network are tightly synchronized. This enables | |||
| building the slotted structure and ensures efficient utilization of | building the slotted structure and ensures efficient utilization of | |||
| resources thanks to proper scheduling policies. Scheduling is key to | resources thanks to proper scheduling policies. Scheduling is key to | |||
| orchestrate the resources that different nodes in a Track or a path | orchestrate the resources that different nodes in a Track or a path | |||
| are using. Slotframes can be split in resource blocks reserving the | are using. Slotframes can be split in resource blocks, reserving the | |||
| needed capacity to certain flows. Periodic and bursty traffic can be | needed capacity to certain flows. Periodic and bursty traffic can be | |||
| handled independently in the schedule, using active and reactive | handled independently in the schedule, using active and reactive | |||
| policies and taking advantage of overprovisioned cells. Along a | policies and taking advantage of overprovisioned cells. Along a | |||
| Track Section 5.2.1, resource blocks can be chained so nodes in | Track (see Section 5.2.1), resource blocks can be chained so nodes in | |||
| previous hops transmit their data before the next packet comes. This | previous hops transmit their data before the next packet comes. This | |||
| provides a tight control to latency along a Track. Collision loss is | provides a tight control to latency along a Track. Collision loss is | |||
| avoided for best effort traffic by overprovisioning resources, giving | avoided for best-effort traffic by overprovisioning resources, giving | |||
| time to the management plane of the network to dedicate more | time to the management plane of the network to dedicate more | |||
| resources if needed. | resources if needed. | |||
| 5.3.1. Centralized Path Computation | 5.3.1. Centralized Path Computation | |||
| When considering end-to-end communication over TSCH, a 6TiSCH device | When considering end-to-end communication over TSCH, a 6TiSCH device | |||
| usually does not place a request for bandwidth between itself and | usually does not place a request for bandwidth between itself and | |||
| another device in the network. Rather, an Operation Control System | another device in the network. Rather, an Operation Control System | |||
| (OCS) invoked through a Human/Machine Interface (HMI) provides the | (OCS) invoked through a Human-Machine Interface (HMI) provides the | |||
| Traffic Specification, in particular in terms of latency and | traffic specification, in particular, in terms of latency and | |||
| reliability, and the end nodes, to a PCE. With this, the PCE | reliability, and the end nodes, to a PCE. With this, the PCE | |||
| computes a Track between the end nodes and provisions every hop in | computes a Track between the end nodes and provisions every hop in | |||
| the Track with per-flow state that describes the per-hop operation | the Track with per-flow state that describes the per-hop operation | |||
| for a given packet, the corresponding timeSlots, and the flow | for a given packet, the corresponding timeSlots, and the flow | |||
| identification to recognize which packet is placed in which Track, | identification to recognize which packet is placed in which Track, | |||
| sort out duplicates, etc. An example of Operational Control System | sort out duplicates, etc. An example of an OCS and HMI is depicted | |||
| and HMI is depicted in Figure 2. | in Figure 2. | |||
| For a static configuration that serves a certain purpose for a long | For a static configuration that serves a certain purpose for a long | |||
| period of time, it is expected that a node will be provisioned in one | period of time, it is expected that a node will be provisioned in one | |||
| shot with a full schedule, which incorporates the aggregation of its | shot with a full schedule, which incorporates the aggregation of its | |||
| behavior for multiple Tracks. The 6TiSCH Architecture expects that | behavior for multiple Tracks. The 6TiSCH architecture expects that | |||
| the programing of the schedule is done over the Constrained | the programming of the schedule is done over the Constrained | |||
| Application Protocol (CoAP) such as discussed in "6TiSCH Resource | Application Protocol (CoAP) as discussed in [CoAP-6TiSCH]. | |||
| Management and Interaction using CoAP" [I-D.ietf-6tisch-coap]. | ||||
| But an Hybrid mode may be required as well whereby a single Track is | However, a Hybrid mode may be required as well, whereby a single | |||
| added, modified, or removed, for instance if it appears that a Track | Track is added, modified, or removed (for instance, if it appears | |||
| does not perform as expected. For that case, the expectation is that | that a Track does not perform as expected). For that case, the | |||
| a protocol that flows along a Track (to be), in a fashion similar to | expectation is that a protocol that flows along a Track (to be), in a | |||
| classical Traffic Engineering (TE) [CCAMP], may be used to update the | fashion similar to classical Traffic Engineering (TE) [CCAMP], may be | |||
| state in the devices. In general, that flow was not designed and it | used to update the state in the devices. In general, that flow was | |||
| is expected that DetNet will determine the appropriate end-to-end | not designed, and it is expected that DetNet will determine the | |||
| protocols to be used in that case. | appropriate end-to-end protocols to be used in that case. | |||
| Stream Management Entity | Stream Management Entity | |||
| Operational Control System and HMI | Operational Control System and HMI | |||
| -+-+-+-+-+-+-+ Northbound -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- | -+-+-+-+-+-+-+ Northbound -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- | |||
| PCE PCE PCE PCE | PCE PCE PCE PCE | |||
| -+-+-+-+-+-+-+ Southbound -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- | -+-+-+-+-+-+-+ Southbound -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- | |||
| --- 6TiSCH------6TiSCH------6TiSCH------6TiSCH-- | --- 6TiSCH------6TiSCH------6TiSCH------6TiSCH-- | |||
| 6TiSCH / Device Device Device Device \ | 6TiSCH / Device Device Device Device \ | |||
| Device- - 6TiSCH | Device- - 6TiSCH | |||
| \ 6TiSCH 6TiSCH 6TiSCH 6TiSCH / Device | \ 6TiSCH 6TiSCH 6TiSCH 6TiSCH / Device | |||
| ----Device------Device------Device------Device-- | ----Device------Device------Device------Device-- | |||
| Figure 2: Architectural Layers | Figure 2: Architectural Layers | |||
| 5.3.1.1. Packet Marking and Handling | 5.3.1.1. Packet Marking and Handling | |||
| Section "Packet Marking and Handling" of [RFC9030] describes the | Section 4.7.1 of [RFC9030] describes the packet tagging and marking | |||
| packet tagging and marking that is expected in 6TiSCH networks. | that is expected in 6TiSCH networks. | |||
| 5.3.1.1.1. Tagging Packets for Flow Identification | 5.3.1.1.1. Tagging Packets for Flow Identification | |||
| Packets that are routed by a PCE along a Track, are tagged to | Packets that are routed by a PCE along a Track are tagged to uniquely | |||
| uniquely identify the Track and associated transmit bundle of | identify the Track and associated transmit bundle of timeSlots. | |||
| timeSlots. | ||||
| It results that the tagging that is used for a DetNet flow outside | It results that the tagging that is used for a DetNet flow outside | |||
| the 6TiSCH Low Power Lossy Network (LLN) must be swapped into 6TiSCH | the 6TiSCH Low-Power and Lossy Network (LLN) must be swapped into | |||
| formats and back as the packet enters and then leaves the 6TiSCH | 6TiSCH formats and back as the packet enters and then leaves the | |||
| network. | 6TiSCH network. | |||
| 5.3.1.1.2. Replication, Retries and Elimination | 5.3.1.1.2. Replication, Retries, and Elimination | |||
| The 6TiSCH Architecture [RFC9030] leverages PREOF over several | The 6TiSCH architecture [RFC9030] leverages PREOF over several | |||
| alternate paths in a network to provide redundancy and parallel | alternate paths in a network to provide redundancy and parallel | |||
| transmissions to bound the end-to-end delay. Considering the | transmissions to bound the end-to-end delay. Considering the | |||
| scenario shown in Figure 3, many different paths are possible for S | scenario shown in Figure 3, many different paths are possible for S | |||
| to reach R. A simple way to benefit from this topology could be to | to reach R. A simple way to benefit from this topology could be to | |||
| use the two independent paths via nodes A, C, E and via B, D, F. But | use the two independent paths via nodes A, C, E and via B, D, F, but | |||
| more complex paths are possible as well. | more complex paths are possible as well. | |||
| (A) (C) (E) | (A) (C) (E) | |||
| source (S) (R) (destination) | source (S) (R) (destination) | |||
| (B) (D) (F) | (B) (D) (F) | |||
| Figure 3: A Typical Ladder Shape with Two Parallel Paths Toward | Figure 3: A Typical Ladder Shape with Two Parallel Paths Toward | |||
| the Destination | the Destination | |||
| By employing a Packet Replication function, each node forwards a copy | By employing a packet replication function, each node forwards a copy | |||
| of each data packet over two different branches. For instance, in | of each data packet over two different branches. For instance, in | |||
| Figure 4, the source node S transmits the data packet to nodes A and | Figure 4, the source node S transmits the data packet to nodes A and | |||
| B, in two different timeslots within the same TSCH slotframe. | B, in two different timeslots within the same TSCH slotframe. S | |||
| transmits twice the same data packet to its Destination Parent (DP) | ||||
| (A) and to its Alternate Parent (AP) (B). | ||||
| ===> (A) => (C) => (E) === | ===> (A) => (C) => (E) === | |||
| // \\// \\// \\ | // \\// \\// \\ | |||
| source (S) //\\ //\\ (R) (destination) | source (S) //\\ //\\ (R) (destination) | |||
| \\ // \\ // \\ // | \\ // \\ // \\ // | |||
| ===> (B) => (D) => (F) === | ===> (B) => (D) => (F) === | |||
| Figure 4: Packet Replication: S transmits twice the same data | Figure 4: Packet Replication | |||
| packet, to its Destination Parent (DP) (A) and to its Alternate | ||||
| Parent (AP) (B). | ||||
| By employing Packet Elimination function once a node receives the | By employing a packet elimination function once it receives the first | |||
| first copy of a data packet, it discards the subsequent copies. | copy of a data packet, a node discards the subsequent copies. | |||
| Because the first copy that reaches a node is the one that matters, | Because the first copy that reaches a node is the one that matters, | |||
| it is the only copy that will be forwarded upward. | it is the only copy that will be forwarded upward. | |||
| Considering that the wireless medium is broadcast by nature, any | Considering that the wireless medium is broadcast by nature, any | |||
| neighbor of a transmitter may overhear a transmission. By employing | neighbor of a transmitter may overhear a transmission. By employing | |||
| the Promiscuous Overhearing function, nodes will have multiple | the promiscuous overhearing function, nodes will have multiple | |||
| opportunities to receive a given data packet. For instance, in | opportunities to receive a given data packet. For instance, in | |||
| Figure 4, when the source node S transmits the data packet to node A, | Figure 4, when the source node S transmits the data packet to node A, | |||
| node B may overhear this transmission. | node B may overhear the transmission. | |||
| 6TiSCH expects elimination and replication of packets along a complex | 6TiSCH expects elimination and replication of packets along a complex | |||
| Track, but has no position about how the sequence numbers would be | Track but has no position about how the sequence numbers would be | |||
| tagged in the packet. | tagged in the packet. | |||
| As it goes, 6TiSCH expects that timeSlots corresponding to copies of | As it goes, 6TiSCH expects that timeSlots corresponding to copies of | |||
| a same packet along a Track are correlated by configuration, and does | the same packet along a Track are correlated by configuration, and | |||
| not need to process the sequence numbers. | does not need to process the sequence numbers. | |||
| The semantics of the configuration must enable correlated timeSlots | The semantics of the configuration must enable correlated timeSlots | |||
| to be grouped for transmit (and respectively receive) with 'OR' | to be grouped for transmit (and receive, respectively) with 'OR' | |||
| relations, and then an 'AND' relation must be configurable between | relations, and then an 'AND' relation must be configurable between | |||
| groups. The semantics is that if the transmit (and respectively | groups. The semantics are such that if the transmit (and receive, | |||
| receive) operation succeeded in one timeSlot in an 'OR' group, then | respectively) operation succeeded in one timeSlot in an 'OR' group, | |||
| all the other timeslots in the group are ignored. Now, if there are | then all the other timeslots in the group are ignored. Now, if there | |||
| at least two groups, the 'AND' relation between the groups indicates | are at least two groups, the 'AND' relation between the groups | |||
| that one operation must succeed in each of the groups. Further | indicates that one operation must succeed in each of the groups. | |||
| details can be found in the 6TiSCH Architecture document [RFC9030]. | Further details can be found in the 6TiSCH architecture document | |||
| [RFC9030]. | ||||
| 5.3.1.2. Topology and Capabilities | 5.3.1.2. Topology and Capabilities | |||
| 6TiSCH nodes are usually IoT devices, characterized by very limited | 6TiSCH nodes are usually IoT devices, characterized by a very limited | |||
| amount of memory, just enough buffers to store one or a few IPv6 | amount of memory, just enough buffers to store one or a few IPv6 | |||
| packets, and limited bandwidth between peers. It results that a node | packets, and limited bandwidth between peers. It results that a node | |||
| will maintain only a small number of peering information, and will | will maintain only a small amount of peering information and will not | |||
| not be able to store many packets waiting to be forwarded. Peers can | be able to store many packets waiting to be forwarded. Peers can be | |||
| be identified through MAC or IPv6 addresses. | identified through MAC or IPv6 addresses. | |||
| Neighbors can be discovered over the radio using mechanism such as | Neighbors can be discovered over the radio using mechanisms such as | |||
| Enhanced Beacons, but, though the neighbor information is available | enhanced beacons, but although the neighbor information is available | |||
| in the 6TiSCH interface data model, 6TiSCH does not describe a | in the 6TiSCH interface data model, 6TiSCH does not describe a | |||
| protocol to pro-actively push the neighborhood information to a PCE. | protocol to proactively push the neighborhood information to a PCE. | |||
| This protocol should be described and should operate over CoAP. The | This protocol should be described and should operate over CoAP. The | |||
| protocol should be able to carry multiple metrics, in particular the | protocol should be able to carry multiple metrics, in particular, the | |||
| same metrics as used for RPL operations [RFC6551]. | same metrics that are used for RPL operations [RFC6551]. | |||
| The energy that the device consumes in sleep, transmit and receive | The energy that the device consumes in sleep, transmit, and receive | |||
| modes can be evaluated and reported. So can the amount of energy | modes can be evaluated and reported, and so can the amount of energy | |||
| that is stored in the device and the power that it can be scavenged | that is stored in the device and the power that can be scavenged from | |||
| from the environment. The PCE should be able to compute Tracks that | the environment. The PCE should be able to compute Tracks that will | |||
| will implement policies on how the energy is consumed, for instance | implement policies on how the energy is consumed, for instance, | |||
| balance between nodes and ensure that the spent energy does not | policies that balance between nodes and ensure that the spent energy | |||
| exceeded the scavenged energy over a period of time. | does not exceed the scavenged energy over a period of time. | |||
| 5.3.1.3. Schedule Management by a PCE | 5.3.1.3. Schedule Management by a PCE | |||
| 6TiSCH supports a mixed model of centralized routes and distributed | 6TiSCH supports a mixed model of centralized routes and distributed | |||
| routes. Centralized routes can for example be computed by a entity | routes. Centralized routes can, for example, be computed by an | |||
| such as a PCE [PCE]. Distributed routes are computed by RPL | entity such as a PCE [PCE]. Distributed routes are computed by RPL | |||
| [RFC6550]. | [RFC6550]. | |||
| Both methods may inject routes in the Routing Tables of the 6TiSCH | Both methods may inject routes in the routing tables of the 6TiSCH | |||
| routers. In either case, each route is associated with a 6TiSCH | routers. In either case, each route is associated with a 6TiSCH | |||
| topology that can be a RPL Instance topology or a Track. The 6TiSCH | topology that can be a RPL Instance topology or a Track. The 6TiSCH | |||
| topology is indexed by an Instance ID, in a format that reuses the | topology is indexed by an Instance ID, in a format that reuses the | |||
| RPLInstanceID as defined in RPL. | RPLInstanceID as defined in RPL. | |||
| Both RPL and PCE rely on shared sources such as policies to define | Both RPL and PCE rely on shared sources such as policies to define | |||
| Global and Local RPLInstanceIDs that can be used by either method. | Global and Local RPLInstanceIDs that can be used by either method. | |||
| It is possible for centralized and distributed routing to share a | It is possible for centralized and distributed routing to share the | |||
| same topology. Generally they will operate in different slotFrames, | same topology. Generally, they will operate in different slotFrames, | |||
| and centralized routes will be used for scheduled traffic and will | and centralized routes will be used for scheduled traffic and will | |||
| have precedence over distributed routes in case of conflict between | have precedence over distributed routes in case of conflict between | |||
| the slotFrames. | the slotFrames. | |||
| 5.3.1.4. SlotFrames and Priorities | 5.3.1.4. SlotFrames and Priorities | |||
| IEEE802.15.4 TSCH avoids contention on the medium by formatting time | IEEE 802.15.4 TSCH avoids contention on the medium by formatting time | |||
| and frequencies in cells of transmission of equal duration. In order | and frequencies in cells of transmission of equal duration. In order | |||
| to describe that formatting of time and frequencies, the 6TiSCH | to describe that formatting of time and frequencies, the 6TiSCH | |||
| architecture defines a global concept that is called a Channel | architecture defines a global concept that is called a Channel | |||
| Distribution and Usage (CDU) matrix; a CDU matrix is a matrix of | Distribution and Usage (CDU) matrix; a CDU matrix is a matrix of | |||
| cells with an height equal to the number of available channels | cells with a height equal to the number of available channels | |||
| (indexed by ChannelOffsets) and a width (in timeSlots) that is the | (indexed by ChannelOffsets) and a width (in timeSlots) that is the | |||
| period of the network scheduling operation (indexed by slotOffsets) | period of the network scheduling operation (indexed by slotOffsets) | |||
| for that CDU matrix. | for that CDU matrix. | |||
| The CDU Matrix is used by the PCE as the map of all the channel | The CDU matrix is used by the PCE as the map of all the channel | |||
| utilization. This organization depends on the time in the future. | utilization. This organization depends on the time in the future. | |||
| The frequency used by a cell in the matrix rotates in a pseudo-random | The frequency used by a cell in the matrix rotates in a pseudorandom | |||
| fashion, from an initial position at an epoch time, as the CDU matrix | fashion, from an initial position at an epoch time, as the CDU matrix | |||
| iterates over and over. | iterates over and over. | |||
| The size of a cell is a timeSlot duration, and values of 10 to 15 | The size of a cell is a timeSlot duration, and values of 10 to 15 | |||
| milliseconds are typical in 802.15.4 TSCH to accommodate for the | milliseconds are typical in 802.15.4 TSCH to accommodate for the | |||
| transmission of a frame and an acknowledgement, including the | transmission of a frame and an acknowledgement, including the | |||
| security validation on the receive side which may take up to a few | security validation on the receive side, which may take up to a few | |||
| milliseconds on some device architecture. The matrix represents the | milliseconds on some device architectures. The matrix represents the | |||
| overall utilisation of the spectrum over time by a scheduled network | overall utilization of the spectrum over time by a scheduled network | |||
| operation. | operation. | |||
| A CDU matrix is computed by the PCE, but unallocated timeSlots may be | A CDU matrix is computed by the PCE, but unallocated timeSlots may be | |||
| used opportunistically by the nodes for classical best effort IP | used opportunistically by the nodes for classical best-effort IP | |||
| traffic. The PCE has precedence in the allocation in case of a | traffic. The PCE has precedence in the allocation in case of a | |||
| conflict. Multiple schedules may coexist, in which case the schedule | conflict. Multiple schedules may coexist, in which case the schedule | |||
| adds a dimension to the matrix and the dimensions are ordered by | adds a dimension to the matrix, and the dimensions are ordered by | |||
| priority. | priority. | |||
| A slotFrame is the base object that a PCE needs to manipulate to | A slotFrame is the base object that a PCE needs to manipulate to | |||
| program a schedule into one device. The slotFrame is a device | program a schedule into one device. The slotFrame is a device | |||
| perspective of a transmission schedule; there can be more than one | perspective of a transmission schedule; there can be more than one | |||
| with different priorities so in case of a contention the highest | with different priorities so in case of a contention the highest | |||
| priority applies. In other words, a slotFrame is the projection of a | priority applies. In other words, a slotFrame is the projection of a | |||
| schedule from the CDU matrix onto one device. Elaboration on that | schedule from the CDU matrix onto one device. Elaboration on that | |||
| concept can be found in section "SlotFrames and Priorities" of | concept can be found in section "SlotFrames and Priorities" of | |||
| [RFC9030], and figures 17 and 18 of [RFC9030] illustrate that | [RFC9030], and Figures 17 and 18 in [RFC9030] illustrate that | |||
| projection. | projection. | |||
| 6. 5G | 6. 5G | |||
| 5G technology enables deterministic communication. Based on the | 5G technology enables deterministic communication. Based on the | |||
| centralized admission control and the scheduling of the wireless | centralized admission control and the scheduling of the wireless | |||
| resources, licensed or unlicensed, quality of service such as latency | resources, licensed or unlicensed, Quality of Service (QoS) such as | |||
| and reliability can be guaranteed. 5G contains several features to | latency and reliability can be guaranteed. 5G contains several | |||
| achieve ultra-reliable and low latency performance, e.g., support for | features to achieve ultra-reliable and low-latency performance (e.g., | |||
| different OFDM numerologies and slot-durations, as well as fast | support for different OFDM numerologies and slot durations), as well | |||
| processing capabilities and redundancy techniques that lead to | as fast processing capabilities and redundancy techniques that lead | |||
| achievable latency numbers of below 1ms with 99.999% or higher | to achievable latency numbers of below 1 ms with 99.999% or higher | |||
| confidence. | confidence. | |||
| 5G also includes features to support Industrial IoT use cases, e.g., | 5G also includes features to support industrial IoT use cases, e.g., | |||
| via the integration of 5G with TSN. This includes 5G capabilities | via the integration of 5G with TSN. This includes 5G capabilities | |||
| for each TSN component, latency, resource management, time | for each TSN component, latency, resource management, time | |||
| synchronization, and reliability. Furthermore, 5G support for TSN | synchronization, and reliability. Furthermore, 5G support for TSN | |||
| can be leveraged when 5G is used as subnet technology for DetNet, in | can be leveraged when 5G is used as the subnet technology for DetNet, | |||
| combination with or instead of TSN, which is the primary subnet for | in combination with or instead of TSN, which is the primary subnet | |||
| DetNet. In addition, the support for integration with TSN | for DetNet. In addition, the support for integration with TSN | |||
| reliability was added to 5G by making DetNet reliability also | reliability was added to 5G by making DetNet reliability also | |||
| applicable, due to the commonalities between TSN and DetNet | applicable, due to the commonalities between TSN and DetNet | |||
| reliability. Moreover, providing IP service is native to 5G and 3GPP | reliability. Moreover, providing IP service is native to 5G, and | |||
| Release 18 adds direct support for DetNet to 5G. | 3GPP Release 18 adds direct support for DetNet to 5G. | |||
| Overall, 5G provides scheduled wireless segments with high | Overall, 5G provides scheduled wireless segments with high | |||
| reliability and availability. In addition, 5G includes capabilities | reliability and availability. In addition, 5G includes capabilities | |||
| for integration to IP networks. This makes 5G a suitable technology | for integration to IP networks. This makes 5G a suitable technology | |||
| to apply RAW upon. | upon which to apply RAW. | |||
| 6.1. Provenance and Documents | 6.1. Provenance and Documents | |||
| The 3rd Generation Partnership Project (3GPP) incorporates many | The 3rd Generation Partnership Project (3GPP) incorporates many | |||
| companies whose business is related to cellular network operation as | companies whose business is related to cellular network operation as | |||
| well as network equipment and device manufacturing. All generations | well as network equipment and device manufacturing. All generations | |||
| of 3GPP technologies provide scheduled wireless segments, primarily | of 3GPP technologies provide scheduled wireless segments, primarily | |||
| in licensed spectrum which is beneficial for reliability and | in licensed spectrum, which is beneficial for reliability and | |||
| availability. | availability. | |||
| In 2016, the 3GPP started to design New Radio (NR) technology | In 2016, the 3GPP started to design New Radio (NR) technology | |||
| belonging to the fifth generation (5G) of cellular networks. NR has | belonging to the fifth generation (5G) of cellular networks. NR has | |||
| been designed from the beginning to not only address enhanced Mobile | been designed from the beginning to not only address enhanced Mobile | |||
| Broadband (eMBB) services for consumer devices such as smart phones | Broadband (eMBB) services for consumer devices such as smart phones | |||
| or tablets but is also tailored for future Internet of Things (IoT) | or tablets, but it is also tailored for future IoT communication and | |||
| communication and connected cyber-physical systems. In addition to | connected cyber-physical systems. In addition to eMBB, requirement | |||
| eMBB, requirement categories have been defined on Massive Machine- | categories have been defined on Massive Machine-Type Communication | |||
| Type Communication (M-MTC) for a large number of connected devices/ | (M-MTC) for a large number of connected devices/sensors and on Ultra- | |||
| sensors, and Ultra-Reliable Low-Latency Communication (URLLC) for | Reliable Low-Latency Communications (URLLC) for connected control | |||
| connected control systems and critical communication as illustrated | systems and critical communication as illustrated in Figure 5. It is | |||
| in Figure 5. It is the URLLC capabilities that make 5G a great | the URLLC capabilities that make 5G a great candidate for reliable | |||
| candidate for reliable low-latency communication. With these three | low-latency communication. With these three cornerstones, NR is a | |||
| corner stones, NR is a complete solution supporting the connectivity | complete solution supporting the connectivity needs of consumers, | |||
| needs of consumers, enterprises, and public sector for both wide area | enterprises, and the public sector for both wide-area and local-area | |||
| and local area, e.g. indoor deployments. A general overview of NR | (e.g., indoor) deployments. A general overview of NR can be found in | |||
| can be found in [TS38300]. | [TS38300]. | |||
| enhanced | enhanced | |||
| Mobile Broadband | Mobile Broadband | |||
| ^ | ^ | |||
| / \ | / \ | |||
| / \ | / \ | |||
| / \ | / \ | |||
| / \ | / \ | |||
| / 5G \ | / 5G \ | |||
| / \ | / \ | |||
| skipping to change at page 30, line 43 ¶ | skipping to change at line 1373 ¶ | |||
| +-----------------+ | +-----------------+ | |||
| Massive Ultra-Reliable | Massive Ultra-Reliable | |||
| Machine-Type Low-Latency | Machine-Type Low-Latency | |||
| Communication Communication | Communication Communication | |||
| Figure 5: 5G Application Areas | Figure 5: 5G Application Areas | |||
| As a result of releasing the first NR specification in 2018 (Release | As a result of releasing the first NR specification in 2018 (Release | |||
| 15), it has been proven by many companies that NR is a URLLC-capable | 15), it has been proven by many companies that NR is a URLLC-capable | |||
| technology and can deliver data packets at 10^-5 packet error rate | technology and can deliver data packets at 10^-5 packet error rate | |||
| within 1ms latency budget [TR37910]. Those evaluations were | within a 1 ms latency budget [TR37910]. Those evaluations were | |||
| consolidated and forwarded to ITU to be included in the [IMT2020] | consolidated and forwarded to ITU to be included in the work on | |||
| work. | [IMT2020]. | |||
| In order to understand communication requirements for automation in | In order to understand communication requirements for automation in | |||
| vertical domains, 3GPP studied different use cases [TR22804] and | vertical domains, 3GPP studied different use cases [TR22804] and | |||
| released technical specification with reliability, availability and | released a technical specification with reliability, availability, | |||
| latency demands for a variety of applications [TS22104]. | and latency demands for a variety of applications [TS22104]. | |||
| As an evolution of NR, multiple studies have been conducted in scope | As an evolution of NR, multiple studies that focus on radio aspects | |||
| of 3GPP Release 16 including the following two, focusing on radio | have been conducted in scope of 3GPP Release 16, including the | |||
| aspects: | following two: | |||
| 1. Study on physical layer enhancements for NR ultra-reliable and | 1. "Study on physical layer enhancements for NR ultra-reliable and | |||
| low latency communication (URLLC) [TR38824]. | low latency case (URLLC)" [TR38824] | |||
| 2. Study on NR industrial Internet of Things (I-IoT) [TR38825]. | 2. "Study on NR industrial Internet of Things (IoT)" [TR38825] | |||
| Resulting of these studies, further enhancements to NR have been | As a result of these studies, further enhancements to NR have been | |||
| standardized in 3GPP Release 16, hence, available in [TS38300], and | standardized in 3GPP Release 16 and are available in [TS38300] and | |||
| continued in 3GPP Release 17 standardization (according to | continued in 3GPP Release 17 standardization (according to | |||
| [RP210854]). | [RP210854]). | |||
| In addition, several enhancements have been done on system | In addition, several enhancements have been made on the system | |||
| architecture level which are reflected in System architecture for the | architecture level, which are reflected in "System architecture for | |||
| 5G System (5GS) [TS23501]. These enhancements include multiple | the 5G System (5GS)" [TS23501]. These enhancements include multiple | |||
| features in support of Time-Sensitive Communications (TSC) by Release | features in support of Time-Sensitive Communications (TSC) by Release | |||
| 16 and Release 17. Further improvements are provided in Release 18, | 16 and Release 17. Further improvements, such as support for DetNet | |||
| e.g., support for DetNet [TR2370046]. | [TR2370046], are provided in Release 18. | |||
| The adoption and the use of 5G is facilitated by multiple | The adoption and the use of 5G is facilitated by multiple | |||
| organizations. For instance, the 5G Alliance for Connected | organizations. For instance, the 5G Alliance for Connected | |||
| Industries and Automation (5G-ACIA) brings together widely varying 5G | Industries and Automation (5G-ACIA) brings together widely varying 5G | |||
| stakeholders including Information and Communication Technology (ICT) | stakeholders including Information and Communication Technology (ICT) | |||
| players and Operational Technology (OT) companies, e.g.: industrial | players and Operational Technology (OT) companies (e.g., industrial | |||
| automation enterprises, machine builders, and end users. Another | automation enterprises, machine builders, and end users). Another | |||
| example is the 5G Automotive Association (5GAA), which bridges ICT | example is the 5G Automotive Association (5GAA), which bridges ICT | |||
| and automotive technology companies to develop end-to-end solutions | and automotive technology companies to develop end-to-end solutions | |||
| for future mobility and transportation services. | for future mobility and transportation services. | |||
| 6.2. General Characteristics | 6.2. General Characteristics | |||
| The 5G Radio Access Network (5G RAN) with its NR interface includes | The 5G Radio Access Network (5G RAN) with its NR interface includes | |||
| several features to achieve Quality of Service (QoS), such as a | several features to achieve Quality of Service (QoS), such as a | |||
| guaranteeably low latency or tolerable packet error rates for | guaranteeably low latency or tolerable packet error rates for | |||
| selected data flows. Determinism is achieved by centralized | selected data flows. Determinism is achieved by centralized | |||
| admission control and scheduling of the wireless frequency resources, | admission control and scheduling of the wireless frequency resources, | |||
| which are typically licensed frequency bands assigned to a network | which are typically licensed frequency bands assigned to a network | |||
| operator. | operator. | |||
| NR enables short transmission slots in a radio subframe, which | NR enables short transmission slots in a radio subframe, which | |||
| benefits low-latency applications. NR also introduces mini-slots, | benefits low-latency applications. NR also introduces mini-slots, | |||
| where prioritized transmissions can be started without waiting for | where prioritized transmissions can be started without waiting for | |||
| slot boundaries, further reducing latency. As part of giving | slot boundaries, further reducing latency. As part of giving | |||
| priority and faster radio access to URLLC traffic, NR introduces | priority and faster radio access to URLLC traffic, NR introduces | |||
| preemption where URLLC data transmission can preempt ongoing non- | preemption, where URLLC data transmission can preempt ongoing non- | |||
| URLLC transmissions. Additionally, NR applies very fast processing, | URLLC transmissions. Additionally, NR applies very fast processing, | |||
| enabling retransmissions even within short latency bounds. | enabling retransmissions even within short latency bounds. | |||
| NR defines extra-robust transmission modes for increased reliability | NR defines extra-robust transmission modes for increased reliability | |||
| both for data and control radio channels. Reliability is further | for both data and control radio channels. Reliability is further | |||
| improved by various techniques, such as multi-antenna transmission, | improved by various techniques, such as multi-antenna transmission, | |||
| the use of multiple frequency carriers in parallel and packet | the use of multiple frequency carriers in parallel, and packet | |||
| duplication over independent radio links. NR also provides full | duplication over independent radio links. NR also provides full | |||
| mobility support, which is an important reliability aspect not only | mobility support, which is an important reliability aspect not only | |||
| for devices that are moving, but also for devices located in a | for devices that are moving, but also for devices located in a | |||
| changing environment. | changing environment. | |||
| Network slicing is seen as one of the key features for 5G, allowing | Network slicing is seen as one of the key features for 5G, allowing | |||
| vertical industries to take advantage of 5G networks and services. | vertical industries to take advantage of 5G networks and services. | |||
| Network slicing is about transforming a Public Land Mobile Network | Network slicing is about transforming a Public Land Mobile Network | |||
| (PLMN) from a single network to a network where logical partitions | (PLMN) from a single network to a network where logical partitions | |||
| are created, with appropriate network isolation, resources, optimized | are created, with appropriate network isolation, resources, optimized | |||
| topology and specific configuration to serve various service | topology, and specific configurations to serve various service | |||
| requirements. An operator can configure and manage the mobile | requirements. An operator can configure and manage the mobile | |||
| network to support various types of services enabled by 5G, for | network to support various types of services enabled by 5G (e.g., | |||
| example eMBB and URLLC, depending on the different customers’ needs. | eMBB and URLLC), depending on the different needs of customers. | |||
| Exposure of capabilities of 5G Systems to the network or applications | Exposure of capabilities of 5G systems to the network or applications | |||
| outside the 3GPP domain have been added to Release 16 [TS23501]. Via | outside the 3GPP domain have been added to Release 16 [TS23501]. | |||
| exposure interfaces, applications can access 5G capabilities, e.g., | Applications can access 5G capabilities like communication service | |||
| communication service monitoring and network maintenance. | monitoring and network maintenance via exposure interfaces. | |||
| For several generations of mobile networks, 3GPP has considered how | For several generations of mobile networks, 3GPP has considered how | |||
| the communication system should work on a global scale with billions | the communication system should work on a global scale with billions | |||
| of users, taking into account resilience aspects, privacy regulation, | of users, taking into account resilience aspects, privacy regulation, | |||
| protection of data, encryption, access and core network security, as | protection of data, encryption, access and core network security, as | |||
| well as interconnect. Security requirements evolve as demands on | well as interconnect. Security requirements evolve as demands on | |||
| trustworthiness increase. For example, this has led to the | trustworthiness increase. For example, this has led to the | |||
| introduction of enhanced privacy protection features in 5G. 5G also | introduction of enhanced privacy protection features in 5G. 5G also | |||
| employs strong security algorithms, encryption of traffic, protection | employs strong security algorithms, encryption of traffic, protection | |||
| of signaling and protection of interfaces. | of signaling, and protection of interfaces. | |||
| One particular strength of mobile networks is the authentication, | One particular strength of mobile networks is the authentication, | |||
| based on well-proven algorithms and tightly coupled with a global | based on well-proven algorithms and tightly coupled with a global | |||
| identity management infrastructure. Since 3G, there is also mutual | identity management infrastructure. Since 3G, there is also mutual | |||
| authentication, allowing the network to authenticate the device and | authentication, allowing the network to authenticate the device and | |||
| the device to authenticate the network. Another strength is secure | the device to authenticate the network. Another strength is secure | |||
| solutions for storage and distribution of keys fulfilling regulatory | solutions for storage and distribution of keys, fulfilling regulatory | |||
| requirements and allowing international roaming. When connecting to | requirements and allowing international roaming. When connecting to | |||
| 5G, the user meets the entire communication system, where security is | 5G, the user meets the entire communication system, where security is | |||
| the result of standardization, product security, deployment, | the result of standardization, product security, deployment, | |||
| operations and management as well as incident handling capabilities. | operations, and management as well as incident-handling capabilities. | |||
| The mobile networks approach the entirety in a rather coordinated | The mobile networks approach the entirety in a rather coordinated | |||
| fashion which is beneficial for security. | fashion, which is beneficial for security. | |||
| 6.3. Deployment and Spectrum | 6.3. Deployment and Spectrum | |||
| The 5G system allows deployment in a vast spectrum range, addressing | The 5G system allows deployment in a vast spectrum range, addressing | |||
| use-cases in both wide-area as well as local networks. Furthermore, | use cases in both wide-area and local-area networks. Furthermore, 5G | |||
| 5G can be configured for public and non-public access. | can be configured for public and non-public access. | |||
| When it comes to spectrum, NR allows combining the merits of many | When it comes to spectrum, NR allows combining the merits of many | |||
| frequency bands, such as the high bandwidths in millimeter Waves | frequency bands, such as the high bandwidths in millimeter waves | |||
| (mmW) for extreme capacity locally, as well as the broad coverage | (mmWaves) for extreme capacity locally and the broad coverage when | |||
| when using mid- and low frequency bands to address wide-area | using mid- and low-frequency bands to address wide-area scenarios. | |||
| scenarios. URLLC is achievable in all these bands. Spectrum can be | URLLC is achievable in all these bands. Spectrum can be either | |||
| either licensed, which means that the license holder is the only | licensed, which means that the license holder is the only authorized | |||
| authorized user of that spectrum range, or unlicensed, which means | user of that spectrum range, or unlicensed, which means that anyone | |||
| that anyone who wants to use the spectrum can do so. | who wants to use the spectrum can do so. | |||
| A prerequisite for critical communication is performance | A prerequisite for critical communication is performance | |||
| predictability, which can be achieved by the full control of the | predictability, which can be achieved by full control of access to | |||
| access to the spectrum, which 5G provides. Licensed spectrum | the spectrum, which 5G provides. Licensed spectrum guarantees | |||
| guarantees control over spectrum usage by the system, making it a | control over spectrum usage by the system, making it a preferable | |||
| preferable option for critical communication. However, unlicensed | option for critical communication. However, unlicensed spectrum can | |||
| spectrum can provide an additional resource for scaling non-critical | provide an additional resource for scaling non-critical | |||
| communications. While NR is initially developed for usage of | communications. While NR was initially developed for usage of | |||
| licensed spectrum, the functionality to access also unlicensed | licensed spectrum, the functionality to also access unlicensed | |||
| spectrum was introduced in 3GPP Release 16. Moreover, URLLC features | spectrum was introduced in 3GPP Release 16. Moreover, URLLC features | |||
| are enhanced in Release 17 [RP210854] to be better applicable to | are enhanced in Release 17 [RP210854] to be better applicable to | |||
| unlicensed spectrum. | unlicensed spectrum. | |||
| Licensed spectrum dedicated to mobile communications has been | Licensed spectrum dedicated to mobile communications has been | |||
| allocated to mobile service providers, i.e. issued as longer-term | allocated to mobile service providers, i.e., issued as longer-term | |||
| licenses by national administrations around the world. These | licenses by national administrations around the world. These | |||
| licenses have often been associated with coverage requirements and | licenses have often been associated with coverage requirements and | |||
| issued across whole countries, or in large regions. Besides this, | issued across whole countries or large regions. Besides this, | |||
| configured as a non-public network (NPN) deployment, 5G can provide | configured as a non-public network (NPN) deployment, 5G can also | |||
| network services also to a non-operator defined organization and its | provide network services to a non-operator defined organization and | |||
| premises such as a factory deployment. By this isolation, quality of | its premises such as a factory deployment. With this isolation, QoS | |||
| service requirements, as well as security requirements can be | requirements as well as security requirements can be achieved. An | |||
| achieved. An integration with a public network, if required, is also | integration with a public network, if required, is also possible. | |||
| possible. The non-public (local) network can thus be interconnected | The non-public (local) network can thus be interconnected with a | |||
| with a public network, allowing devices to roam between the networks. | public network, allowing devices to roam between the networks. | |||
| In an alternative model, some countries are now in the process of | In an alternative model, some countries are now in the process of | |||
| allocating parts of the 5G spectrum for local use to industries. | allocating parts of the 5G spectrum for local use to industries. | |||
| These non-service providers then have a choice of applying for a | These non-service providers then have the choice to apply for a local | |||
| local license themselves and operating their own network or | license themselves and operate their own network or to cooperate with | |||
| cooperating with a public network operator or service provider. | a public network operator or service provider. | |||
| 6.4. Applicability to Deterministic Flows | 6.4. Applicability to Deterministic Flows | |||
| 6.4.1. System Architecture | 6.4.1. System Architecture | |||
| The 5G system [TS23501] consists of the User Equipment (UE) at the | The 5G system [TS23501] consists of the User Equipment (UE) at the | |||
| terminal side, and the Radio Access Network (RAN) with the gNB as | terminal side, the Radio Access Network (RAN) with the gNodeB (gNB) | |||
| radio base station node, as well as the Core Network (CN), which is | as radio base station node, and the Core Network (CN), which is | |||
| connected to the external Data Network (DN). The core network is | connected to the external Data Network (DN). The CN is based on a | |||
| based on a service-based architecture with the central functions: | service-based architecture with the following central functions: | |||
| Access and Mobility Management Function (AMF), Session Management | Access and Mobility Management Function (AMF), Session Management | |||
| Function (SMF) and User Plane Function (UPF) as illustrated in | Function (SMF), and User Plane Function (UPF) as illustrated in | |||
| Figure 6. "(Note that this document only explains key functions, | Figure 6. (Note that this document only explains key functions; | |||
| however, Figure 6 provides a more detailed view, and [SYSTOVER5G] | however, Figure 6 provides a more detailed view, and [SYSTOVER5G] | |||
| summarizes the functions and provides the full definition of acronyms | summarizes the functions and provides the full definitions of the | |||
| used in the figure.)" | acronyms used in the figure.) | |||
| The gNB’s main responsibility is the radio resource management, | The gNB's main responsibility is radio resource management, including | |||
| including admission control and scheduling, mobility control and | admission control and scheduling, mobility control, and radio | |||
| radio measurement handling. The AMF handles the UE’s connection | measurement handling. The AMF handles the UE's connection status and | |||
| status and security, while the SMF controls the UE’s data sessions. | security, while the SMF controls the UE's data sessions. The UPF | |||
| The UPF handles the user plane traffic. | handles the user plane traffic. | |||
| The SMF can instantiate various Packet Data Unit (PDU) sessions for | The SMF can instantiate various Packet Data Unit (PDU) sessions for | |||
| the UE, each associated with a set of QoS flows, i.e., with different | the UE, each associated with a set of QoS flows, i.e., with different | |||
| QoS profiles. Segregation of those sessions is also possible, e.g., | QoS profiles). Segregation of those sessions is also possible; for | |||
| resource isolation in the RAN and in the CN can be defined (slicing). | example, resource isolation in the RAN and CN can be defined | |||
| (slicing). | ||||
| +----+ +---+ +---+ +---+ +---+ +---+ | +----+ +---+ +---+ +---+ +---+ +---+ | |||
| |NSSF| |NEF| |NRF| |PCF| |UDM| |AF | | |NSSF| |NEF| |NRF| |PCF| |UDM| |AF | | |||
| +--+-+ +-+-+ +-+-+ +-+-+ +-+-+ +-+-+ | +--+-+ +-+-+ +-+-+ +-+-+ +-+-+ +-+-+ | |||
| | | | | | | | | | | | | | | |||
| Nnssf| Nnef| Nnrf| Npcf| Nudm| Naf| | Nnssf| Nnef| Nnrf| Npcf| Nudm| Naf| | |||
| | | | | | | | | | | | | | | |||
| ---+------+-+-----+-+------------+--+-----+-+--- | ---+------+-+-----+-+------------+--+-----+-+--- | |||
| | | | | | | | | | | |||
| Nausf| Nausf| Nsmf| | | Nausf| Nausf| Nsmf| | | |||
| skipping to change at page 36, line 6 ¶ | skipping to change at line 1582 ¶ | |||
| / | | | / | | | |||
| +--+-+ +--+--+ +--+---+ +----+ | +--+-+ +--+--+ +--+---+ +----+ | |||
| | UE +---+(R)AN+--N3--+ UPF +--N6--+ DN | | | UE +---+(R)AN+--N3--+ UPF +--N6--+ DN | | |||
| +----+ +-----+ ++----++ +----+ | +----+ +-----+ ++----++ +----+ | |||
| | | | | | | |||
| +-N9-+ | +-N9-+ | |||
| Figure 6: 5G System Architecture | Figure 6: 5G System Architecture | |||
| To allow UE mobility across cells/gNBs, handover mechanisms are | To allow UE mobility across cells/gNBs, handover mechanisms are | |||
| supported in NR. For an established connection, i.e., connected mode | supported in NR. For an established connection (i.e., connected mode | |||
| mobility, a gNB can configure a UE to report measurements of received | mobility), a gNB can configure a UE to report measurements of | |||
| signal strength and quality of its own and neighbouring cells, | received signal strength and quality of its own and neighboring | |||
| periodically or event-based. Based on these measurement reports, the | cells, periodically or based on events. Based on these measurement | |||
| gNB decides to handover a UE to another target cell/gNB. Before | reports, the gNB decides to hand over a UE to another target cell/ | |||
| triggering the handover, it is hand-shaked with the target gNB based | gNB. Before triggering the handover, it is handshaked with the | |||
| on network signalling. A handover command is then sent to the UE and | target gNB based on network signaling. A handover command is then | |||
| the UE switches its connection to the target cell/gNB. The Packet | sent to the UE, and the UE switches its connection to the target | |||
| Data Convergence Protocol (PDCP) of the UE can be configured to avoid | cell/gNB. The Packet Data Convergence Protocol (PDCP) of the UE can | |||
| data loss in this procedure, i.e., handle retransmissions if needed. | be configured to avoid data loss in this procedure, i.e., to handle | |||
| Data forwarding is possible between source and target gNB as well. | retransmissions if needed. Data forwarding is possible between | |||
| To improve the mobility performance further, i.e., to avoid | source and target gNB as well. To improve the mobility performance | |||
| connection failures, e.g., due to too-late handovers, the mechanism | further (i.e., to avoid connection failures due to too-late | |||
| of conditional handover is introduced in Release 16 specifications. | handovers), the mechanism of conditional handover is introduced in | |||
| Therein a conditional handover command, defining a triggering point, | Release 16 specifications. Therein, a conditional handover command, | |||
| can be sent to the UE before UE enters a handover situation. A | defining a triggering point, can be sent to the UE before the UE | |||
| further improvement that has been introduced in Release 16 is the | enters a handover situation. A further improvement that has been | |||
| Dual Active Protocol Stack (DAPS), where the UE maintains the | introduced in Release 16 is the Dual Active Protocol Stack (DAPS), | |||
| connection to the source cell while connecting to the target cell. | where the UE maintains the connection to the source cell while | |||
| This way, potential interruptions in packet delivery can be avoided | connecting to the target cell. This way, potential interruptions in | |||
| entirely. | packet delivery can be avoided entirely. | |||
| 6.4.2. Overview of The Radio Protocol Stack | 6.4.2. Overview of the Radio Protocol Stack | |||
| The protocol architecture for NR consists of the L1 Physical layer | The protocol architecture for NR consists of the Layer 1 Physical | |||
| (PHY) and as part of the L2, the sublayers of Medium Access Control | (PHY) layer and, as part of Layer 2, the sublayers of Medium Access | |||
| (MAC), Radio Link Control (RLC), Packet Data Convergence Protocol | Control (MAC), Radio Link Control (RLC), Packet Data Convergence | |||
| (PDCP), as well as the Service Data Adaption Protocol (SDAP). | Protocol (PDCP), and Service Data Adaption Protocol (SDAP). | |||
| The PHY layer handles signal processing related actions, such as | The PHY layer handles actions related to signal processing, such as | |||
| encoding/decoding of data and control bits, modulation, antenna | encoding/decoding of data and control bits, modulation, antenna | |||
| precoding and mapping. | precoding, and mapping. | |||
| The MAC sub-layer handles multiplexing and priority handling of | The MAC sublayer handles multiplexing and priority handling of | |||
| logical channels (associated with QoS flows) to transport blocks for | logical channels (associated with QoS flows) to transport blocks for | |||
| PHY transmission, as well as scheduling information reporting and | PHY transmission, as well as scheduling information reporting and | |||
| error correction through Hybrid Automated Repeat Request (HARQ). | error correction through Hybrid Automated Repeat Request (HARQ). | |||
| The RLC sublayer handles sequence numbering of higher layer packets, | The RLC sublayer handles sequence numbering of higher-layer packets, | |||
| retransmissions through Automated Repeat Request (ARQ), if | retransmissions through Automated Repeat Request (ARQ), if | |||
| configured, as well as segmentation and reassembly and duplicate | configured, as well as segmentation and reassembly and duplicate | |||
| detection. | detection. | |||
| The PDCP sublayer consists of functionalities for ciphering/ | The PDCP sublayer consists of functionalities for ciphering/ | |||
| deciphering, integrity protection/verification, re-ordering and in- | deciphering, integrity protection/verification, reordering and in- | |||
| order delivery, duplication and duplicate handling for higher layer | order delivery, and duplication and duplicate handling for higher- | |||
| packets, and acts as the anchor protocol to support handovers. | layer packets. This sublayer also acts as the anchor protocol to | |||
| support handovers. | ||||
| The SDAP sublayer provides services to map QoS flows, as established | The SDAP sublayer provides services to map QoS flows, as established | |||
| by the 5G core network, to data radio bearers (associated with | by the 5G core network, to data radio bearers (associated with | |||
| logical channels), as used in the 5G RAN. | logical channels), as used in the 5G RAN. | |||
| Additionally, in RAN, the Radio Resource Control (RRC) protocol, | Additionally, in RAN, the Radio Resource Control (RRC) protocol | |||
| handles the access control and configuration signalling for the | handles the access control and configuration signaling for the | |||
| aforementioned protocol layers. RRC messages are considered L3 and | aforementioned protocol layers. RRC messages are considered Layer 3 | |||
| thus transmitted also via those radio protocol layers. | and are thus also transmitted via those radio protocol layers. | |||
| To provide low latency and high reliability for one transmission | To provide low latency and high reliability for one transmission link | |||
| link, i.e., to transport data (or control signaling) of one radio | (i.e., to transport data or control signaling of one radio bearer via | |||
| bearer via one carrier, several features have been introduced on the | one carrier), several features have been introduced on the user plane | |||
| user plane protocols for PHY and L2, as explained in the following. | protocols for PHY and Layer 2, as explained below. | |||
| 6.4.3. Radio (PHY) | 6.4.3. Radio (PHY) | |||
| NR is designed with native support of antenna arrays utilizing | NR is designed with native support of antenna arrays utilizing | |||
| benefits from beamforming, transmissions over multiple MIMO layers | benefits from beamforming, transmissions over multiple MIMO layers, | |||
| and advanced receiver algorithms allowing effective interference | and advanced receiver algorithms allowing effective interference | |||
| cancellation. Those antenna techniques are the basis for high signal | cancellation. Those antenna techniques are the basis for high signal | |||
| quality and effectiveness of spectral usage. Spatial diversity with | quality and the effectiveness of spectral usage. Spatial diversity | |||
| up to 4 MIMO layers in UL and up to 8 MIMO layers in DL is supported. | with up to four MIMO layers in UL and up to eight MIMO layers in DL | |||
| Together with spatial-domain multiplexing, antenna arrays can focus | is supported. Together with spatial-domain multiplexing, antenna | |||
| power in desired direction to form beams. NR supports beam | arrays can focus power in the desired direction to form beams. NR | |||
| management mechanisms to find the best suitable beam for UE initially | supports beam management mechanisms to find the best suitable beam | |||
| and when it is moving. In addition, gNBs can coordinate their | for UE initially and when it is moving. In addition, gNBs can | |||
| respective DL and UL transmissions over the backhaul network keeping | coordinate their respective DL and UL transmissions over the backhaul | |||
| interference reasonably low, and even make transmissions or | network, keeping interference reasonably low, and even make | |||
| receptions from multiple points (multi-TRP). Multi-TRP can be used | transmissions or receptions from multiple points (multi-TRP). Multi- | |||
| for repetition of data packet in time, in frequency or over multiple | TRP can be used for repetition of a data packet in time, in | |||
| MIMO layers which can improve reliability even further. | frequency, or over multiple MIMO layers, which can improve | |||
| reliability even further. | ||||
| Any downlink transmission to a UE starts from resource allocation | Any downlink transmission to a UE starts from resource allocation | |||
| signaling over the Physical Downlink Control Channel (PDCCH). If it | signaling over the Physical Downlink Control Channel (PDCCH). If it | |||
| is successfully received, the UE will know about the scheduled | is successfully received, the UE will know about the scheduled | |||
| transmission and may receive data over the Physical Downlink Shared | transmission and may receive data over the Physical Downlink Shared | |||
| Channel (PDSCH). If retransmission is required according to the HARQ | Channel (PDSCH). If retransmission is required according to the HARQ | |||
| scheme, a signaling of negative acknowledgement (NACK) on the | scheme, a signaling of negative acknowledgement (NACK) on the | |||
| Physical Uplink Control Channel (PUCCH) is involved and PDCCH | Physical Uplink Control Channel (PUCCH) is involved, and PDCCH | |||
| together with PDSCH transmissions (possibly with additional | together with PDSCH transmissions (possibly with additional | |||
| redundancy bits) are transmitted and soft-combined with previously | redundancy bits) are transmitted and soft-combined with previously | |||
| received bits. Otherwise, if no valid control signaling for | received bits. Otherwise, if no valid control signaling for | |||
| scheduling data is received, nothing is transmitted on PUCCH | scheduling data is received, nothing is transmitted on PUCCH | |||
| (discontinuous transmission - DTX),and the base station upon | (discontinuous transmission (DTX)), and upon detecting DTX, the base | |||
| detecting DTX will retransmit the initial data. | station will retransmit the initial data. | |||
| An uplink transmission normally starts from a Scheduling Request (SR) | An uplink transmission normally starts from a Scheduling Request | |||
| – a signaling message from the UE to the base station sent via PUCCH. | (SR), a signaling message from the UE to the base station sent via | |||
| Once the scheduler is informed about buffer data in UE, e.g., by SR, | PUCCH. Once the scheduler is informed about buffer data in the UE | |||
| the UE transmits a data packet on the Physical Uplink Shared Channel | (e.g., by SR), the UE transmits a data packet on the Physical Uplink | |||
| (PUSCH). Pre-scheduling not relying on SR is also possible (see | Shared Channel (PUSCH). Pre-scheduling, not relying on SR, is also | |||
| following section). | possible (see Section 6.4.4). | |||
| Since transmission of data packets require usage of control and data | Since transmission of data packets requires usage of control and data | |||
| channels, there are several methods to maintain the needed | channels, there are several methods to maintain the needed | |||
| reliability. NR uses Low Density Parity Check (LDPC) codes for data | reliability. NR uses Low Density Parity Check (LDPC) codes for data | |||
| channels, Polar codes for PDCCH, as well as orthogonal sequences and | channels, polar codes for PDCCH, as well as orthogonal sequences and | |||
| Polar codes for PUCCH. For ultra-reliability of data channels, very | polar codes for PUCCH. For ultra-reliability of data channels, very | |||
| robust (low spectral efficiency) Modulation and Coding Scheme (MCS) | robust (low-spectral efficiency) Modulation and Coding Scheme (MCS) | |||
| tables are introduced containing very low (down to 1/20) LDPC code | tables are introduced containing very low (down to 1/20) LDPC code | |||
| rates using BPSK or QPSK. Also, PDCCH and PUCCH channels support | rates using BPSK or QPSK. Also, PDCCH and PUCCH channels support | |||
| multiple code rates including very low ones for the channel | multiple code rates including very low ones for the channel | |||
| robustness. | robustness. | |||
| A connected UE reports downlink (DL) quality to gNB by sending | A connected UE reports downlink (DL) quality to gNB by sending | |||
| Channel State Information (CSI) reports via PUCCH while uplink (UL) | Channel State Information (CSI) reports via PUCCH while uplink (UL) | |||
| quality is measured directly at gNB. For both uplink and downlink, | quality is measured directly at gNB. For both uplink and downlink, | |||
| gNB selects the desired MCS number and signals it to the UE by | gNB selects the desired MCS number and signals it to the UE by | |||
| Downlink Control Information (DCI) via PDCCH channel. For URLLC | Downlink Control Information (DCI) via PDCCH channel. For URLLC | |||
| services, the UE can assist the gNB by advising that MCS targeting | services, the UE can assist the gNB by advising that MCS targeting a | |||
| 10^-5 Block Error Rate (BLER) are used. Robust link adaptation | 10^-5 Block Error Rate (BLER) are used. Robust link adaptation | |||
| algorithms can maintain the needed level of reliability considering a | algorithms can maintain the needed level of reliability, considering | |||
| given latency bound. | a given latency bound. | |||
| Low latency on the physical layer is provided by short transmission | Low latency on the physical layer is provided by short transmission | |||
| duration which is possible by using high Subcarrier Spacing (SCS) and | duration, which is possible by using high Subcarrier Spacing (SCS) | |||
| the allocation of only one or a few Orthogonal Frequency Division | and the allocation of only one or a few Orthogonal Frequency Division | |||
| Multiplexing (OFDM) symbols. For example, the shortest latency for | Multiplexing (OFDM) symbols. For example, the shortest latency for | |||
| the worst case in DL can be 0.23ms and in UL can be 0.24ms according | the worst case is 0.23 ms in DL and 0.24 ms in UL (according to | |||
| to (section 5.7.1 in [TR37910]). Moreover, if the initial | Section 5.7.1 in [TR37910]). Moreover, if the initial transmission | |||
| transmission has failed, HARQ feedback can quickly be provided and an | has failed, HARQ feedback can quickly be provided and an HARQ | |||
| HARQ retransmission is scheduled. | retransmission scheduled. | |||
| Dynamic multiplexing of data associated with different services is | Dynamic multiplexing of data associated with different services is | |||
| highly desirable for efficient use of system resources and to | highly desirable for efficient use of system resources and to | |||
| maximize system capacity. Assignment of resources for eMBB is | maximize system capacity. Assignment of resources for eMBB is | |||
| usually done with regular (longer) transmission slots, which can lead | usually done with regular (longer) transmission slots, which can lead | |||
| to blocking of low latency services. To overcome the blocking, eMBB | to blocking of low-latency services. To overcome the blocking, eMBB | |||
| resources can be pre-empted and re-assigned to URLLC services. In | resources can be preempted and reassigned to URLLC services. In this | |||
| this way, spectrally efficient assignments for eMBB can be ensured | way, spectrally efficient assignments for eMBB can be ensured while | |||
| while providing flexibility required to ensure a bounded latency for | providing the flexibility required to ensure a bounded latency for | |||
| URLLC services. In downlink, the gNB can notify the eMBB UE about | URLLC services. In downlink, the gNB can notify the eMBB UE about | |||
| pre-emption after it has happened, while in uplink there are two pre- | preemption after it has happened, while in uplink there are two | |||
| emption mechanisms: special signaling to cancel eMBB transmission and | preemption mechanisms: special signaling to cancel eMBB transmission | |||
| URLLC dynamic power boost to suppress eMBB transmission. | and URLLC dynamic power boost to suppress eMBB transmission. | |||
| 6.4.4. Scheduling and QoS (MAC) | 6.4.4. Scheduling and QoS (MAC) | |||
| One integral part of the 5G system is the Quality of Service (QoS) | One integral part of the 5G system is the Quality of Service (QoS) | |||
| framework [TS23501]. QoS flows are setup by the 5G system for | framework [TS23501]. QoS flows are set up by the 5G system for | |||
| certain IP or Ethernet packet flows, so that packets of each flow | certain IP or Ethernet packet flows, so that packets of each flow | |||
| receive the same forwarding treatment, i.e., in scheduling and | receive the same forwarding treatment (i.e., in scheduling and | |||
| admission control. QoS flows can for example be associated with | admission control). For example, QoS flows can be associated with | |||
| different priority level, packet delay budgets and tolerable packet | different priority levels, packet delay budgets, and tolerable packet | |||
| error rates. Since radio resources are centrally scheduled in NR, | error rates. Since radio resources are centrally scheduled in NR, | |||
| the admission control function can ensure that only those QoS flows | the admission control function can ensure that only QoS flows for | |||
| are admitted for which QoS targets can be reached. | which QoS targets can be reached are admitted. | |||
| NR transmissions in both UL and DL are scheduled by the gNB | NR transmissions in both UL and DL are scheduled by the gNB | |||
| [TS38300]. This ensures radio resource efficiency, fairness in | [TS38300]. This ensures radio resource efficiency and fairness in | |||
| resource usage of the users and enables differentiated treatment of | resource usage of the users, and it enables differentiated treatment | |||
| the data flows of the users according to the QoS targets of the | of the data flows of the users according to the QoS targets of the | |||
| flows. Those QoS flows are handled as data radio bearers or logical | flows. Those QoS flows are handled as data radio bearers or logical | |||
| channels in NR RAN scheduling. | channels in NR RAN scheduling. | |||
| The gNB can dynamically assign DL and UL radio resources to users, | The gNB can dynamically assign DL and UL radio resources to users, | |||
| indicating the resources as DL assignments or UL grants via control | indicating the resources as DL assignments or UL grants via control | |||
| channel to the UE. Radio resources are defined as blocks of OFDM | channel to the UE. Radio resources are defined as blocks of OFDM | |||
| symbols in spectral domain and time domain. Different lengths are | symbols in spectral domain and time domain. Different lengths are | |||
| supported in time domain, i.e., (multiple) slot or mini-slot lengths. | supported in time domain, (i.e., multiple slot or mini-slot lengths). | |||
| Resources of multiple frequency carriers can be aggregated and | Resources of multiple frequency carriers can be aggregated and | |||
| jointly scheduled to the UE. | jointly scheduled to the UE. | |||
| Scheduling decisions are based, e.g., on channel quality measured on | Scheduling decisions are based, e.g., on channel quality measured on | |||
| reference signals and reported by the UE (cf. periodical CSI reports | reference signals and reported by the UE (cf. periodical CSI reports | |||
| for DL channel quality). The transmission reliability can be chosen | for DL channel quality). The transmission reliability can be chosen | |||
| in the scheduling algorithm, i.e., by link adaptation where an | in the scheduling algorithm, i.e., chosen by link adaptation where an | |||
| appropriate transmission format (e.g., robustness of modulation and | appropriate transmission format (e.g., robustness of modulation and | |||
| coding scheme, controlled UL power) is selected for the radio channel | coding scheme, controlled UL power) is selected for the radio channel | |||
| condition of the UE. Retransmissions, based on HARQ feedback, are | condition of the UE. Retransmissions, based on HARQ feedback, are | |||
| also controlled by the scheduler. The feedback transmission in HARQ | also controlled by the scheduler. The feedback transmission in HARQ | |||
| loop introduces delays, but there are methods to minimize it by using | loop introduces delays, but there are methods to minimize it by using | |||
| short transmission formats, sub-slot feedback reporting and PUCCH | short transmission formats, sub-slot feedback reporting, and PUCCH | |||
| carrier switching. If needed to avoid HARQ round-trip time delays, | carrier switching. If needed to avoid HARQ round-trip time delays, | |||
| repeated transmissions can be also scheduled beforehand, to the cost | repeated transmissions can be also scheduled beforehand, to the cost | |||
| of reduced spectral efficiency. | of reduced spectral efficiency. | |||
| In dynamic DL scheduling, transmission can be initiated immediately | In dynamic DL scheduling, transmission can be initiated immediately | |||
| when DL data becomes available in the gNB. However, for dynamic UL | when DL data becomes available in the gNB. However, for dynamic UL | |||
| scheduling, when data becomes available but no UL resources are | scheduling, when data becomes available but no UL resources are | |||
| available yet, the UE indicates the need for UL resources to the gNB | available yet, the UE indicates the need for UL resources to the gNB | |||
| via a (single bit) scheduling request message in the UL control | via a (single bit) scheduling request message in the UL control | |||
| channel. When thereupon UL resources are scheduled to the UE, the UE | channel. When thereupon UL resources are scheduled to the UE, the UE | |||
| can transmit its data and may include a buffer status report, | can transmit its data and may include a buffer status report that | |||
| indicating the exact amount of data per logical channel still left to | indicates the exact amount of data per logical channel still left to | |||
| be sent. More UL resources may be scheduled accordingly. To avoid | be sent. More UL resources may be scheduled accordingly. To avoid | |||
| the latency introduced in the scheduling request loop, UL radio | the latency introduced in the scheduling request loop, UL radio | |||
| resources can also be pre-scheduled. | resources can also be pre-scheduled. | |||
| In particular for periodical traffic patterns, the pre-scheduling can | In particular, for periodical traffic patterns, the pre-scheduling | |||
| rely on the scheduling features DL Semi-Persistent Scheduling (SPS) | can rely on the scheduling features DL Semi-Persistent Scheduling | |||
| and UL Configured Grant (CG). With these features, periodically | (SPS) and UL Configured Grant (CG). With these features, | |||
| recurring resources can be assigned in DL and UL. Multiple parallels | periodically recurring resources can be assigned in DL and UL. | |||
| of those configurations are supported, in order to serve multiple | Multiple parallels of those configurations are supported in order to | |||
| parallel traffic flows of the same UE. | serve multiple parallel traffic flows of the same UE. | |||
| To support QoS enforcement in the case of mixed traffic with | To support QoS enforcement in the case of mixed traffic with | |||
| different QoS requirements, several features have recently been | different QoS requirements, several features have recently been | |||
| introduced. This way, e.g., different periodical critical QoS flows | introduced. This way, e.g., different periodical critical QoS flows | |||
| can be served together with best effort transmissions, by the same | can be served, together with best-effort transmissions by the same | |||
| UE. Among others, these features (partly Release 16) are: 1) UL | UE. These features (partly Release 16) include the following: | |||
| logical channel transmission restrictions allowing to map logical | ||||
| channels of certain QoS only to intended UL resources of a certain | * UL logical channel transmission restrictions, allowing logical | |||
| frequency carrier, slot-length, or CG configuration, and 2) intra-UE | channels of certain QoS to only be mapped to intended UL resources | |||
| pre-emption and multiplexing, allowing critical UL transmissions to | of a certain frequency carrier, slot length, or CG configuration. | |||
| either pre-empt non-critical transmissions or being multiplexed with | ||||
| non-critical transmissions keeping different reliability targets. | * intra-UE preemption and multiplexing, allowing critical UL | |||
| transmissions to either preempt non-critical transmissions or be | ||||
| multiplexed with non-critical transmissions keeping different | ||||
| reliability targets. | ||||
| When multiple frequency carriers are aggregated, duplicate parallel | When multiple frequency carriers are aggregated, duplicate parallel | |||
| transmissions can be employed (beside repeated transmissions on one | transmissions can be employed (beside repeated transmissions on one | |||
| carrier). This is possible in the Carrier Aggregation (CA) | carrier). This is possible in the Carrier Aggregation (CA) | |||
| architecture where those carriers originate from the same gNB, or in | architecture where those carriers originate from the same gNB or in | |||
| the Dual Connectivity (DC) architecture where the carriers originate | the Dual Connectivity (DC) architecture where the carriers originate | |||
| from different gNBs, i.e., the UE is connected to two gNBs in this | from different gNBs (i.e., the UE is connected to two gNBs in this | |||
| case. In both cases, transmission reliability is improved by this | case). In both cases, transmission reliability is improved by this | |||
| means of providing frequency diversity. | means of providing frequency diversity. | |||
| In addition to licensed spectrum, a 5G system can also utilize | In addition to licensed spectrum, a 5G system can also utilize | |||
| unlicensed spectrum to offload non-critical traffic. This version of | unlicensed spectrum to offload non-critical traffic. This version of | |||
| NR is called NR-U, part of 3GPP Release 16. The central scheduling | NR, called NR-U, is part of 3GPP Release 16. The central scheduling | |||
| approach applies also for unlicensed radio resources, but in addition | approach also applies for unlicensed radio resources and the | |||
| also the mandatory channel access mechanisms for unlicensed spectrum, | mandatory channel access mechanisms for unlicensed spectrum (e.g., | |||
| e.g., Listen Before Talk (LBT) are supported in NR-U. This way, by | Listen Before Talk (LBT) is supported in NR-U). This way, by using | |||
| using NR, operators have and can control access to both licensed and | NR, operators have and can control access to both licensed and | |||
| unlicensed frequency resources. | unlicensed frequency resources. | |||
| 6.4.5. Time-Sensitive Communications (TSC) | 6.4.5. Time-Sensitive Communications (TSC) | |||
| Recent 3GPP releases have introduced various features to support | Recent 3GPP releases have introduced various features to support | |||
| multiple aspects of Time-Sensitive Communication (TSC), which | multiple aspects of Time-Sensitive Communication (TSC), which | |||
| includes Time-Sensitive Networking (TSN) and beyond as described in | includes Time-Sensitive Networking (TSN) and beyond, as described in | |||
| this section. | this section. | |||
| The main objective of Time-Sensitive Networking (TSN) is to provide | The main objective of TSN is to provide guaranteed data delivery | |||
| guaranteed data delivery within a guaranteed time window, i.e., | within a guaranteed time window (i.e., bounded low latency). IEEE | |||
| bounded low latency. IEEE 802.1 TSN [IEEE802.1TSN] is a set of open | 802.1 TSN [IEEE802.1TSN] is a set of open standards that provide | |||
| standards that provide features to enable deterministic communication | features to enable deterministic communication on standard IEEE 802.3 | |||
| on standard IEEE 802.3 Ethernet [IEEE802.3]. TSN standards can be | Ethernet [IEEE802.3]. TSN standards can be seen as a toolbox for | |||
| seen as a toolbox for traffic shaping, resource management, time | traffic shaping, resource management, time synchronization, and | |||
| synchronization, and reliability. | reliability. | |||
| A TSN stream is a data flow between one end station (Talker) to | A TSN stream is a data flow between one end station (talker) to | |||
| another end station (Listener). In the centralized configuration | another end station (listener). In the centralized configuration | |||
| model, TSN bridges are configured by the Central Network Controller | model, TSN bridges are configured by the Central Network Controller | |||
| (CNC) [IEEE802.1Qcc] to provide deterministic connectivity for the | (CNC) [IEEE802.1Qcc] to provide deterministic connectivity for the | |||
| TSN stream through the network. Time-based traffic shaping provided | TSN stream through the network. Time-based traffic shaping provided | |||
| by Scheduled Traffic [IEEE802.1Qbv] may be used to achieve bounded | by scheduled traffic [IEEE802.1Qbv] may be used to achieve bounded | |||
| low latency. The TSN tool for time synchronization is the | low latency. The TSN tool for time synchronization is the | |||
| generalized Precision Time Protocol (gPTP) [IEEE802.1AS]), which | generalized Precision Time Protocol (gPTP) [IEEE802.1AS], which | |||
| provides reliable time synchronization that can be used by end | provides reliable time synchronization that can be used by end | |||
| stations and by other TSN tools, e.g., Scheduled Traffic | stations and by other TSN tools (e.g., scheduled traffic | |||
| [IEEE802.1Qbv]. High availability, as a result of ultra-reliability, | [IEEE802.1Qbv]). High availability, as a result of ultra- | |||
| is provided for data flows by the Frame Replication and Elimination | reliability, is provided for data flows by the Frame Replication and | |||
| for Reliability (FRER) [IEEE802.1CB] mechanism. | Elimination for Reliability (FRER) mechanism [IEEE802.1CB]. | |||
| 3GPP Release 16 includes integration of 5G with TSN, i.e., specifies | 3GPP Release 16 includes integration of 5G with TSN, i.e., specifies | |||
| functions for the 5G System (5GS) to deliver TSN streams such that | functions for the 5G System (5GS) to deliver TSN streams such that | |||
| the meet their QoS requirements. A key aspect of the integration is | the meet their QoS requirements. A key aspect of the integration is | |||
| the 5GS appears from the rest of the network as a set of TSN bridges, | the 5GS appears from the rest of the network as a set of TSN bridges, | |||
| in particular, one virtual bridge per User Plane Function (UPF) on | in particular, one virtual bridge per User Plane Function (UPF) on | |||
| the user plane. The 5GS includes TSN Translator (TT) functionality | the user plane. The 5GS includes TSN Translator (TT) functionality | |||
| for the adaptation of the 5GS to the TSN bridged network and for | for the adaptation of the 5GS to the TSN bridged network and for | |||
| hiding the 5GS internal procedures. The 5GS provides the following | hiding the 5GS internal procedures. The 5GS provides the following | |||
| components: | components: | |||
| 1. interface to TSN controller, as per [IEEE802.1Qcc] for the fully | 1. interface to TSN controller, as per [IEEE802.1Qcc] for the fully | |||
| centralized configuration model | centralized configuration model | |||
| 2. time synchronization via reception and transmission of gPTP PDUs | 2. time synchronization via reception and transmission of gPTP PDUs | |||
| [IEEE802.1AS] | [IEEE802.1AS] | |||
| 3. low latency, hence, can be integrated with Scheduled Traffic | 3. low latency, hence, can be integrated with scheduled traffic | |||
| [IEEE802.1Qbv] | [IEEE802.1Qbv] | |||
| 4. reliability, hence, can be integrated with FRER [IEEE802.1CB] | 4. reliability, hence, can be integrated with FRER [IEEE802.1CB] | |||
| 3GPP Release 17 [TS23501] introduced enhancements to generalize | 3GPP Release 17 [TS23501] introduced enhancements to generalize | |||
| support for Time-Sensitive Communications (TSC) beyond TSN. This | support for TSC beyond TSN. This includes IP communications to | |||
| includes IP communications to provide time-sensitive service to, | provide time-sensitive services (e.g., to Video, Imaging, and Audio | |||
| e.g., Video, Imaging and Audio for Professional Applications (VIAPA). | for Professional Applications (VIAPA)). The system model of 5G | |||
| The system model of 5G acting as a “TSN bridge” in Release 16 has | acting as a "TSN bridge" in Release 16 has been reused to enable the | |||
| been reused to enable the 5GS acting as a “TSC node” in a more | 5GS acting as a "TSC node" in a more generic sense (which includes | |||
| generic sense (which includes TSN bridge and IP node). In the case | TSN bridge and IP node). In the case of TSC that does not involve | |||
| of TSC that does not involve TSN, requirements are given via exposure | TSN, requirements are given via exposure interfaces, and the control | |||
| interface and the control plane provides the service based on QoS and | plane provides the service based on QoS and time synchronization | |||
| time synchronization requests from an Application Function (AF). | requests from an Application Function (AF). | |||
| Figure 7 shows an illustration of 5G-TSN integration where an | Figure 7 shows an illustration of 5G-TSN integration where an | |||
| industrial controller (Ind Ctrlr) is connected to industrial Input/ | industrial controller (Ind Ctrlr) is connected to industrial Input/ | |||
| Output devices (I/O dev) via 5G. The 5GS can directly transport | Output devices (I/O dev) via 5G. The 5GS can directly transport | |||
| Ethernet frames since Release 15, thus, end-to-end Ethernet | Ethernet frames since Release 15; thus, end-to-end Ethernet | |||
| connectivity is provided. The 5GS implements the required interfaces | connectivity is provided. The 5GS implements the required interfaces | |||
| towards the TSN controller functions such as the CNC, thus adapts to | towards the TSN controller functions such as the CNC, thus adapting | |||
| the settings of the TSN network. A 5G user plane virtual bridge | to the settings of the TSN network. A 5G user plane virtual bridge | |||
| interconnects TSN bridges or connects end stations, e.g., I/O devices | interconnects TSN bridges or connects end stations (e.g., I/O devices | |||
| to the TSN network. TSN Translators (TTs), i.e., the Device-Side TSN | to the TSN network). TTs, i.e., the Device-Side TSN Translator (DS- | |||
| Translator (DS-TT) at the UE and the Network-Side TSN Translator (NW- | TT) at the UE and the Network-Side TSN Translator (NW-TT) at the UPF, | |||
| TT) at the UPF have a key role in the interconnection. Note that the | have a key role in the interconnection. Note that the introduction | |||
| introduction of 5G brings flexibility in various aspects, e.g., more | of 5G brings flexibility in various aspects, e.g., a more flexible | |||
| flexible network topology because a wireless hop can replace several | network topology because a wireless hop can replace several wireline | |||
| wireline hops thus significantly reduce the number of hops end-to- | hops, thus significantly reducing the number of hops end to end. | |||
| end. [TSN5G] dives more into the integration of 5G with TSN. | [TSN5G] dives more into the integration of 5G with TSN. | |||
| +------------------------------+ | +------------------------------+ | |||
| | 5G System | | | 5G System | | |||
| | +---+| | | +---+| | |||
| | +-+ +-+ +-+ +-+ +-+ |TSN|| | | +-+ +-+ +-+ +-+ +-+ |TSN|| | |||
| | | | | | | | | | | | |AF |......+ | | | | | | | | | | | | |AF |......+ | |||
| | +++ +++ +++ +++ +++ +-+-+| . | | +++ +++ +++ +++ +++ +-+-+| . | |||
| | | | | | | | | . | | | | | | | | | . | |||
| | -+---+---++--+-+-+--+-+- | . | | -+---+---++--+-+-+--+-+- | . | |||
| | | | | | | +--+--+ | | | | | | | +--+--+ | |||
| skipping to change at page 43, line 45 ¶ | skipping to change at line 1938 ¶ | |||
| <----------------- end-to-end Ethernet -------------------> | <----------------- end-to-end Ethernet -------------------> | |||
| Figure 7: 5G - TSN Integration | Figure 7: 5G - TSN Integration | |||
| NR supports accurate reference time synchronization in 1us accuracy | NR supports accurate reference time synchronization in 1us accuracy | |||
| level. Since NR is a scheduled system, an NR UE and a gNB are | level. Since NR is a scheduled system, an NR UE and a gNB are | |||
| tightly synchronized to their OFDM symbol structures. A 5G internal | tightly synchronized to their OFDM symbol structures. A 5G internal | |||
| reference time can be provided to the UE via broadcast or unicast | reference time can be provided to the UE via broadcast or unicast | |||
| signaling, associating a known OFDM symbol to this reference clock. | signaling, associating a known OFDM symbol to this reference clock. | |||
| The 5G internal reference time can be shared within the 5G network, | The 5G internal reference time can be shared within the 5G network | |||
| i.e., radio and core network components. Release 16 has introduced | (i.e., radio and core network components). Release 16 has introduced | |||
| interworking with gPTP for multiple time domains, where the 5GS acts | interworking with gPTP for multiple time domains, where the 5GS acts | |||
| as a virtual gPTP time-aware system and supports the forwarding of | as a virtual gPTP time-aware system and supports the forwarding of | |||
| gPTP time synchronization information between end stations and | gPTP time synchronization information between end stations and | |||
| bridges through the 5G user plane TTs. These account for the | bridges through the 5G user plane TTs. These account for the | |||
| residence time of the 5GS in the time synchronization procedure. One | residence time of the 5GS in the time synchronization procedure. One | |||
| special option is when the 5GS internal reference time is not only | special option is when the 5GS internal reference time is not only | |||
| used within the 5GS, but also to the rest of the devices in the | used within the 5GS, but also to the rest of the devices in the | |||
| deployment, including connected TSN bridges and end stations. | deployment, including connected TSN bridges and end stations. | |||
| Release 17 includes further improvements, i.e., methods for | Release 17 includes further improvements (i.e., methods for | |||
| propagation delay compensation in RAN, further improving the accuracy | propagation delay compensation in RAN), further improving the | |||
| for time synchronization over-the-air, as well as the possibility for | accuracy for time synchronization over the air, as well as the | |||
| the TSN grandmaster clock to reside on the UE side. More extensions | possibility for the TSN grandmaster clock to reside on the UE side. | |||
| and flexibility were added to the time synchronization service making | More extensions and flexibility were added to the time | |||
| it general for TSC with additional support of other types of clocks | synchronization service, making it general for TSC, with additional | |||
| and time distribution such as boundary clock, transparent clock peer- | support of other types of clocks and time distribution such as | |||
| to-peer, transparent clock end-to-end, aside from the time-aware | boundary clock, transparent clock peer-to-peer, and transparent clock | |||
| system used for TSN. Additionally, it is possible to use internal | end-to-end, aside from the time-aware system used for TSN. | |||
| access stratum signaling to distribute timing (and not the usual | Additionally, it is possible to use internal access stratum signaling | |||
| (g)PTP messages), for which the required accuracy can be provided by | to distribute timing (and not the usual (g)PTP messages), for which | |||
| the AF [TS23501]. The same time synchronization service is expected | the required accuracy can be provided by the AF [TS23501]. The same | |||
| to be further extended and enhanced in Release 18 to support Timing | time synchronization service is expected to be further extended and | |||
| Resiliency (according to study item [SP211634]), where the 5G system | enhanced in Release 18 to support Timing Resiliency (according to | |||
| can provide a back-up or alternative timing source for the failure of | study item [SP211634]), where the 5G system can provide a backup or | |||
| the local GNSS source (or other primary timing source) used by the | alternative timing source for the failure of the local GNSS source | |||
| vertical. | (or other primary timing source) used by the vertical. | |||
| IETF Deterministic Networking (DetNet) is the technology to support | IETF DetNet is the technology to support time-sensitive | |||
| time-sensitive communications at the IP layer. 3GPP Release 18 | communications at the IP layer. 3GPP Release 18 includes a study | |||
| includes a study [TR2370046] on interworking between 5G and DetNet. | [TR2370046] on interworking between 5G and DetNet. Along the TSC | |||
| Along the TSC framework introduced for Release 17, the 5GS acts as a | framework introduced for Release 17, the 5GS acts as a DetNet node | |||
| DetNet node for the support of DetNet, see Figure 7.1-1 in | for the support of DetNet; see Figure 7.1-1 in [TR2370046]. The | |||
| [TR2370046]. The study provides details on how the 5GS is exposed by | study provides details on how the 5GS is exposed by the Time | |||
| the Time Sensitive Communication and Time Synchronization Function | Sensitive Communication and Time Synchronization Function (TSCTSF) to | |||
| (TSCTSF) to the DetNet controller as a router on a per UPF | the DetNet controller as a router on a per-UPF granularity (similar | |||
| granularity (similarly to the per UPF Virtual TSN Bridge granularity | to the per-UPF Virtual TSN Bridge granularity shown in Figure 11). | |||
| shown in Figure 11). In particular, it is listed what parameters are | In particular, it lists the parameters that are provided by the | |||
| provided by the TSCTSF to the DetNet controller. The study also | TSCTSF to the DetNet controller. The study also includes how the | |||
| includes how the TSCTSF maps DetNet flow parameters to 5G QoS | TSCTSF maps DetNet flow parameters to 5G QoS parameters. Note that | |||
| parameters. Note that TSN is the primary subnetwork technology for | TSN is the primary subnetwork technology for DetNet. Thus, the work | |||
| DetNet. Thus, the DetNet over TSN work, e.g., [RFC9023], can be | on DetNet over TSN, e.g., [RFC9023], can be leveraged via the TSN | |||
| leveraged via the TSN support built in 5G. | support built in 5G. | |||
| Redundancy architectures were specified in order to provide | Redundancy architectures were specified in order to provide | |||
| reliability against any kind of failure on the radio link or nodes in | reliability against any kind of failure on the radio link or nodes in | |||
| the RAN and the core network. Redundant user plane paths can be | the RAN and the core network. Redundant user plane paths can be | |||
| provided based on the dual connectivity architecture, where the UE | provided based on the dual connectivity architecture, where the UE | |||
| sets up two PDU sessions towards the same data network, and the 5G | sets up two PDU sessions towards the same data network, and the 5G | |||
| system makes the paths of the two PDU sessions independent as | system makes the paths of the two PDU sessions independent as | |||
| illustrated in Figure 9. There are two PDU sessions involved in the | illustrated in Figure 9. There are two PDU sessions involved in the | |||
| solution: the first spans from the UE via gNB1 to UPF1, acting as the | solution: The first spans from the UE via gNB1 to UPF1, acting as the | |||
| first PDU session anchor, while the second spans from the UE via gNB2 | first PDU session anchor, while the second spans from the UE via gNB2 | |||
| to UPF2, acting as second the PDU session anchor. The independent | to UPF2, acting as second the PDU session anchor. | |||
| paths may continue beyond the 3GPP network. Redundancy Handling | ||||
| Functions (RHFs) are deployed outside of the 5GS, i.e., in Host A | The independent paths may continue beyond the 3GPP network. | |||
| (the device) and in Host B (the network). RHF can implement | Redundancy Handling Functions (RHFs) are deployed outside of the 5GS, | |||
| replication and elimination functions as per [IEEE802.1CB] or the | i.e., in Host A (the device) and in Host B (the network). RHF can | |||
| Packet Replication, Elimination, and Ordering Functions (PREOF) of | implement replication and elimination functions as per [IEEE802.1CB] | |||
| IETF Deterministic Networking (DetNet) [RFC8655]. | or the Packet Replication, Elimination, and Ordering Functions | |||
| (PREOF) of IETF DetNet [RFC8655]. | ||||
| +........+ | +........+ | |||
| . Device . +------+ +------+ +------+ | . Device . +------+ +------+ +------+ | |||
| . . + gNB1 +--N3--+ UPF1 |--N6--+ | | . . + gNB1 +--N3--+ UPF1 |--N6--+ | | |||
| . ./+------+ +------+ | | | . ./+------+ +------+ | | | |||
| . +----+ / | | | . +----+ / | | | |||
| . | |/. | | | . | |/. | | | |||
| . | UE + . | DN | | . | UE + . | DN | | |||
| . | |\. | | | . | |\. | | | |||
| . +----+ \ | | | . +----+ \ | | | |||
| . .\+------+ +------+ | | | . .\+------+ +------+ | | | |||
| +........+ + gNB2 +--N3--+ UPF2 |--N6--+ | | +........+ + gNB2 +--N3--+ UPF2 |--N6--+ | | |||
| +------+ +------+ +------+ | +------+ +------+ +------+ | |||
| Figure 8: Reliability with Single UE | Figure 8: Reliability with Single UE | |||
| An alternative solution is that multiple UEs per device are used for | An alternative solution is that multiple UEs per device are used for | |||
| user plane redundancy as illustrated in Figure 9. Each UE sets up a | user plane redundancy as illustrated in Figure 9. Each UE sets up a | |||
| PDU session. The 5GS ensures that those PDU sessions of the | PDU session. The 5GS ensures that the PDU sessions of the different | |||
| different UEs are handled independently internal to the 5GS. There | UEs are handled independently internal to the 5GS. There is no | |||
| is no single point of failure in this solution, which also includes | single point of failure in this solution, which also includes RHF | |||
| RHF outside of the 5G system, e.g., as per FRER or as PREOF | outside of the 5G system, e.g., as per the FRER or PREOF | |||
| specifications. | specifications. | |||
| +.........+ | +.........+ | |||
| . Device . | . Device . | |||
| . . | . . | |||
| . +----+ . +------+ +------+ +------+ | . +----+ . +------+ +------+ +------+ | |||
| . | UE +-----+ gNB1 +--N3--+ UPF1 |--N6--+ | | . | UE +-----+ gNB1 +--N3--+ UPF1 |--N6--+ | | |||
| . +----+ . +------+ +------+ | | | . +----+ . +------+ +------+ | | | |||
| . . | DN | | . . | DN | | |||
| . +----+ . +------+ +------+ | | | . +----+ . +------+ +------+ | | | |||
| . | UE +-----+ gNB2 +--N3--+ UPF2 |--N6--+ | | . | UE +-----+ gNB2 +--N3--+ UPF2 |--N6--+ | | |||
| . +----+ . +------+ +------+ +------+ | . +----+ . +------+ +------+ +------+ | |||
| . . | . . | |||
| +.........+ | +.........+ | |||
| Figure 9: Reliability with Dual UE | Figure 9: Reliability with Dual UE | |||
| Note that the abstraction provided by the RHF and the location of the | Note that the abstraction provided by the RHF and the location of the | |||
| RHF being outside of the 5G system make 5G equally supporting | RHF being outside of the 5G system make 5G equally supporting | |||
| integration for reliability both with FRER of TSN and PREOF of DetNet | integration for reliability with both FRER of TSN and PREOF of | |||
| as they both rely on the same concept. | DetNet, as they both rely on the same concept. | |||
| 7. L-band Digital Aeronautical Communications System | 7. L-Band Digital Aeronautical Communications System (LDACS) | |||
| One of the main pillars of the modern Air Traffic Management (ATM) | One of the main pillars of the modern Air Traffic Management (ATM) | |||
| system is the existence of a communication infrastructure that | system is the existence of a communication infrastructure that | |||
| enables efficient aircraft guidance and safe separation in all phases | enables efficient aircraft guidance and safe separation in all phases | |||
| of flight. Although current systems are technically mature, they are | of flight. Although current systems are technically mature, they | |||
| suffering from the VHF band’s increasing saturation in high-density | suffer from the VHF band's increasing saturation in high-density | |||
| areas and the limitations posed by analogue radio. Therefore, | areas and the limitations posed by analog radio. Therefore, aviation | |||
| aviation globally and the European Union (EU) in particular, strives | (globally and in the European Union (EU) in particular) strives for a | |||
| for a sustainable modernization of the aeronautical communication | sustainable modernization of the aeronautical communication | |||
| infrastructure. | infrastructure. | |||
| In the long-term, ATM communication shall transition from analogue | In the long term, ATM communication shall transition from analog VHF | |||
| VHF voice and VDL2 communication to more spectrum efficient digital | voice and VDL Mode 2 communication to more spectrum-efficient digital | |||
| data communication. The European ATM Master Plan foresees this | data communication. The European ATM Master Plan foresees this | |||
| transition to be realized for terrestrial communications by the | transition to be realized for terrestrial communications by the | |||
| development and implementation of the L-band Digital Aeronautical | development and implementation of the L-band Digital Aeronautical | |||
| Communications System (LDACS). | Communications System (LDACS). | |||
| LDACS has been designed with applications related to the safety and | LDACS has been designed with applications related to the safety and | |||
| regularity of the flight in mind. It has therefore been designed as | regularity of the flight in mind. It has therefore been designed as | |||
| a deterministic wireless data link (as far as possible). | a deterministic wireless data link (as far as possible). | |||
| It is a secure, scalable and spectrum efficient data link with | It is a secure, scalable, and spectrum-efficient data link with | |||
| embedded navigation capability and thus, is the first truly | embedded navigation capability; thus, it is the first truly | |||
| integrated Communications, Navigation, and Surveillance (CNS) system | integrated Communications, Navigation, and Surveillance (CNS) system | |||
| recognized by the International Civil Aviation Organization (ICAO) | recognized by the International Civil Aviation Organization (ICAO). | |||
| During flight tests the LDACS capabilities have been successfully | During flight tests, the LDACS capabilities have been successfully | |||
| demonstrated. A viable roll-out scenario has been developed which | demonstrated. A viable rollout scenario has been developed, which | |||
| allows gradual introduction of LDACS with immediate use and revenues. | allows gradual introduction of LDACS with immediate use and revenues. | |||
| Finally, ICAO is developing LDACS standards to pave the way for the | Finally, ICAO is developing LDACS standards to pave the way for the | |||
| future. | future. | |||
| LDACS shall enable IPv6 based air-ground communication related to the | LDACS shall enable IPv6-based air-ground communication related to the | |||
| safety and regularity of the flight. The particular challenge is | safety and regularity of the flight. The particular challenge is | |||
| that no new frequencies can be made available for terrestrial | that no new frequencies can be made available for terrestrial | |||
| aeronautical communication. It was thus necessary to develop | aeronautical communication. It was thus necessary to develop | |||
| procedures to enable the operation of LDACS in parallel with other | procedures to enable the operation of LDACS in parallel with other | |||
| services in the same frequency band, more in [RFC9372]. | services in the same frequency band; see [RFC9372] for more | |||
| information. | ||||
| 7.1. Provenance and Documents | 7.1. Provenance and Documents | |||
| The development of LDACS has already made substantial progress in the | The development of LDACS has already made substantial progress in the | |||
| Single European Sky ATM Research (SESAR) framework, and is currently | Single European Sky ATM Research (SESAR) framework, and it is | |||
| being continued in the follow-up program, SESAR2020 [RIH18]. A key | currently being continued in the follow-up program, SESAR2020 | |||
| objective of the SESAR activities is to develop, implement and | [RIH18]. A key objective of the SESAR activities is to develop, | |||
| validate a modern aeronautical data link able to evolve with aviation | implement, and validate a modern aeronautical data link able to | |||
| needs over long-term. To this end, an LDACS specification has been | evolve with aviation needs over the long term. To this end, an LDACS | |||
| produced [GRA19] and is continuously updated; transmitter | specification has been produced [GRA19] and is continuously updated; | |||
| demonstrators were developed to test the spectrum compatibility of | transmitter demonstrators were developed to test the spectrum | |||
| LDACS with legacy systems operating in the L-band [SAJ14]; and the | compatibility of LDACS with legacy systems operating in the L-band | |||
| overall system performance was analyzed by computer simulations, | [SAJ14], and the overall system performance was analyzed by computer | |||
| indicating that LDACS can fulfill the identified requirements | simulations, indicating that LDACS can fulfill the identified | |||
| [GRA11]. | requirements [GRA11]. | |||
| LDACS standardization within the framework of the ICAO started in | LDACS standardization within the framework of the ICAO started in | |||
| December 2016. The ICAO standardization group has produced an | December 2016. The ICAO standardization group has produced an | |||
| initial Standards and Recommended Practices (SARPs) document | initial Standards and Recommended Practices (SARPs) document | |||
| [ICAO18]. The SARPs document defines the general characteristics of | [ICAO18]. The SARPs document defines the general characteristics of | |||
| LDACS. | LDACS. | |||
| Up to now the LDACS standardization has been focused on the | Up to now, the LDACS standardization has been focused on the | |||
| development of the physical layer and the data link layer, only | development of the physical layer and the data link layer; only | |||
| recently have higher layers come into the focus of the LDACS | recently have higher layers come into the focus of the LDACS | |||
| development activities. There is currently no "IPv6 over LDACS" | development activities. There is currently no "IPv6 over LDACS" | |||
| specification; however, SESAR2020 has started the testing of | specification; however, SESAR2020 has started the testing of | |||
| IPv6-based LDACS testbeds. The IPv6 architecture for the | IPv6-based LDACS testbeds. The IPv6 architecture for the | |||
| aeronautical telecommunication network is called the Future | aeronautical telecommunication network is called the Future | |||
| Communications Infrastructure (FCI). FCI shall support quality of | Communications Infrastructure (FCI). FCI shall support QoS, | |||
| service, diversity, and mobility under the umbrella of the "multi- | diversity, and mobility under the umbrella of the "multi-link | |||
| link concept". This work is conducted by ICAO working group WG-I. | concept". This work is conducted by the ICAO WG-I Working Group. | |||
| In addition to standardization activities several industrial LDACS | In addition to standardization activities, several industrial LDACS | |||
| prototypes have been built. One set of LDACS prototypes has been | prototypes have been built. One set of LDACS prototypes has been | |||
| evaluated in flight trials confirming the theoretical results | evaluated in flight trials, confirming the theoretical results | |||
| predicting the system performance [GRA18][BEL22][GRA23] . | predicting the system performance [GRA18] [BEL22] [GRA23]. | |||
| 7.2. General Characteristics | 7.2. General Characteristics | |||
| LDACS will become one of several wireless access networks connecting | LDACS will become one of several wireless access networks connecting | |||
| aircraft to the Aeronautical Telecommunications Network (ATN). The | aircraft to the Aeronautical Telecommunications Network (ATN). The | |||
| LDACS access network contains several ground stations, each of them | LDACS access network contains several ground stations, each of which | |||
| providing one LDACS radio cell. The LDACS air interface is a | provides one LDACS radio cell. The LDACS air interface is a cellular | |||
| cellular data link with a star-topology connecting aircraft to | data link with a star topology connecting aircraft to ground stations | |||
| ground-stations with a full duplex radio link. Each ground-station | with a full duplex radio link. Each ground station is the | |||
| is the centralized instance controlling all air-ground communications | centralized instance controlling all air-ground communications within | |||
| within its radio cell. | its radio cell. | |||
| The user data rate of LDACS is 315 kbit/s to 1428 kbit/s on the | The user data rate of LDACS is 315 kbit/s to 1428 kbit/s on the | |||
| forward link, and 294 kbit/s to 1390 kbit/s on the reverse link, | forward link and 294 kbit/s to 1390 kbit/s on the reverse link, | |||
| depending on coding and modulation. Due to strong interference from | depending on coding and modulation. Due to strong interference from | |||
| legacy systems in the L-band, the most robust coding and modulation | legacy systems in the L-band, the most robust coding and modulation | |||
| should be expected for initial deployment, i.e., 315/294 kbit/s on | should be expected for initial deployment, i.e., 315 kbit/s on the | |||
| the forward/reverse link, respectively. | forward link and 294 kbit/s on the reverse link. | |||
| In addition to the communications capability, LDACS also offers a | In addition to the communications capability, LDACS also offers a | |||
| navigation capability. Ranging data, similar to DME (Distance | navigation capability. Ranging data, similar to DME (Distance | |||
| Measuring Equipment), is extracted from the LDACS communication links | Measuring Equipment), is extracted from the LDACS communication links | |||
| between aircraft and LDACS ground stations. This results in LDACS | between aircraft and LDACS ground stations. This results in LDACS | |||
| providing an APNT (Alternative Position, Navigation and Timing) | providing an APNT (Alternative Position, Navigation and Timing) | |||
| capability to supplement the existing on-board GNSS (Global | capability to supplement the existing on-board GNSS (Global | |||
| Navigation Satellite System) without the need for additional | Navigation Satellite System) without the need for additional | |||
| bandwidth. Operationally, there will be no difference for pilots | bandwidth. Operationally, there will be no difference for pilots | |||
| whether the navigation data are provided by LDACS or DME. This | whether the navigation data are provided by LDACS or DME. This | |||
| capability was flight tested and proven during the MICONAV flight | capability was flight tested and proven during the MICONAV flight | |||
| trials in 2019 [BAT19]. | trials in 2019 [BAT19]. | |||
| In previous works and during the MICONAV flight campaign in 2019, it | In previous works and during the MICONAV flight campaign in 2019, it | |||
| was also shown, that LDACS can be used for surveillance capability. | was also shown that LDACS can be used for surveillance capability. | |||
| Filip et al. [FIL19] shown passive radar capabilities of LDACS and | Filip et al. [FIL19] have shown the passive radar capabilities of | |||
| Automatic Dependence Surveillance – Contract (ADS-C) was demonstrated | LDACS, and Automatic Dependence Surveillance - Contract (ADS-C) was | |||
| via LDACS during the flight campaign 2019 [SCH19]. | demonstrated via LDACS during the flight campaign 2019 [SCH19]. | |||
| Since LDACS has been mainly designed for air traffic management | Since LDACS has been mainly designed for air traffic management | |||
| communication it supports mutual entity authentication, integrity and | communication, it supports mutual entity authentication, integrity | |||
| confidentiality capabilities of user data messages and some control | and confidentiality capabilities of user data messages, and some | |||
| channel protection capabilities [MAE18], [MAE191], [MAE192], [MAE20]. | control channel protection capabilities [MAE18] [MAE191] [MAE192] | |||
| [MAE20]. | ||||
| Overall this makes LDACS the world's first truly integrated CNS | Overall, this makes LDACS the world's first truly integrated CNS | |||
| system and is the worldwide most mature, secure, terrestrial long- | system and is the most mature, secure, and terrestrial long-range CNS | |||
| range CNS technology for civil aviation. | technology for civil aviation worldwide. | |||
| 7.3. Deployment and Spectrum | 7.3. Deployment and Spectrum | |||
| LDACS has its origin in merging parts of the B-VHF [BRA06], B-AMC | LDACS has its origin in merging parts of the B-VHF [BRA06], B-AMC | |||
| [SCH08], TIA-902 (P34) [HAI09], and WiMAX IEEE 802.16e technologies | [SCH08], TIA-902 (P34) [HAI09], and WiMAX IEEE 802.16e [EHA11] | |||
| [EHA11]. In 2007 the spectrum for LDACS was allocated at the World | technologies. In 2007, the spectrum for LDACS was allocated at the | |||
| Radio Conference (WRC). | World Radio Conference (WRC). | |||
| It was decided to allocate the spectrum next to Distance Measuring | It was decided to allocate the spectrum next to Distance Measuring | |||
| Equipment (DME), resulting in an in-lay approach between the DME | Equipment (DME), resulting in an in-lay approach between the DME | |||
| channels for LDAC [SCH14]. | channels for LDAC [SCH14]. | |||
| LDACS is currently being standardized by ICAO and several roll-out | LDACS is currently being standardized by ICAO and several rollout | |||
| strategies are discussed: | strategies are discussed. | |||
| The LDACS data link provides enhanced capabilities to existing | The LDACS data link provides enhanced capabilities to existing | |||
| Aeronautical communications infrastructure enabling them to better | aeronautical communications infrastructures, enabling them to better | |||
| support user needs and new applications. The deployment scalability | support user needs and new applications. The deployment scalability | |||
| of LDACS allows its implementation to start in areas where most | of LDACS allows its implementation to start in areas where it is most | |||
| needed to Improve immediately the performance of already fielded | needed to immediately improve the performance of and already-fielded | |||
| infrastructure. Later the deployment is extended based on | infrastructure. Later, the deployment is extended based on | |||
| operational demand. An attractive scenario for upgrading the | operational demand. An attractive scenario for upgrading the | |||
| existing VHF communication systems by adding an additional LDACS data | existing VHF communication systems by adding an additional LDACS data | |||
| link is described below. | link is described below. | |||
| When considering the current VDL Mode 2 infrastructure and user base, | When considering the current VDL Mode 2 infrastructure and user base, | |||
| a very attractive win-win situation comes about, when the | a very attractive win-win situation comes about when the | |||
| technological advantages of LDACS are combined with the existing VDL | technological advantages of LDACS are combined with the existing VDL | |||
| mode 2 infrastructure. LDACS provides at least 50 time more capacity | Mode 2 infrastructure. LDACS provides at least 50 times more | |||
| than VDL Mode 2 and is a natural enhancement to the existing VDL Mode | capacity than VDL Mode 2 and is a natural enhancement to the existing | |||
| 2 business model. The advantage of this approach is that the VDL | VDL Mode 2 business model. The advantage of this approach is that | |||
| Mode 2 infrastructure can be fully reused. Beyond that, it opens the | the VDL Mode 2 infrastructure can be fully reused. Beyond that, it | |||
| way for further enhancements [ICAO19]. | opens the way for further enhancements [ICAO19]. | |||
| 7.4. Applicability to Deterministic Flows | 7.4. Applicability to Deterministic Flows | |||
| As LDACS is a ground-based digital communications system for flight | As LDACS is a ground-based digital communications system for flight | |||
| guidance and communications related to safety and regularity of | guidance and communications related to safety and regularity of | |||
| flight, time-bounded deterministic arrival times for safety critical | flight, time-bounded deterministic arrival times for safety critical | |||
| messages are a key feature for its successful deployment and roll- | messages are a key feature for its successful deployment and rollout. | |||
| out. | ||||
| 7.4.1. System Architecture | 7.4.1. System Architecture | |||
| Up to 512 Aircraft Station (AS) communicate to an LDACS Ground | Up to 512 Aircraft Stations (ASes) communicate to an LDACS Ground | |||
| Station (GS) in the Reverse Link (RL). GS communicate to an AS in | Station (GS) in the reverse link (RL). A GS communicates to an AS in | |||
| the Forward Link (FL). Via an Access-Router (AC-R) GSs connect the | the Forward Link (FL). Via an Access-Router (AC-R), GSs connect the | |||
| LDACS sub-network to the global Aeronautical Telecommunications | LDACS subnetwork to the global Aeronautical Telecommunications | |||
| Network (ATN) to which the corresponding Air Traffic Services (ATS) | Network (ATN) to which the corresponding Air Traffic Services (ATS) | |||
| and Aeronautical Operational Control (AOC) end systems are attached. | and Aeronautical Operational Control (AOC) end systems are attached. | |||
| 7.4.2. Overview of the Radio Protocol Stack | 7.4.2. Overview of the Radio Protocol Stack | |||
| The protocol stack of LDACS is implemented in the AS and GS: It | The protocol stack of LDACS is implemented in the AS and GS; it | |||
| consists of the Physical Layer (PHY) with five major functional | consists of the physical (PHY) layer with five major functional | |||
| blocks above it. Four are placed in the Data Link Layer (DLL) of the | blocks above it. Four are placed in the data link layer (DLL) of the | |||
| AS and GS: (1) Medium Access Layer (MAC), (2) Voice Interface (VI), | AS and GS: | |||
| (3) Data Link Service (DLS), and (4) LDACS Management Entity (LME). | ||||
| The last entity resides within the Sub-Network Layer: Sub-Network | 1. Medium Access Layer (MAC), | |||
| 2. Voice Interface (VI), | ||||
| 3. Data Link Service (DLS), and | ||||
| 4. LDACS Management Entity (LME). | ||||
| The last entity resides within the subnetwork layer: the Subnetwork | ||||
| Protocol (SNP). The LDACS network is externally connected to voice | Protocol (SNP). The LDACS network is externally connected to voice | |||
| units, radio control units, and the ATN Network Layer. | units, radio control units, and the ATN network layer. | |||
| Communications between MAC and LME layer is split into four distinct | Communications between the MAC and LME layers is split into four | |||
| control channels: The Broadcast Control Channel (BCCH) where LDACS | distinct control channels: | |||
| ground stations announce their specific LDACS cell, including | ||||
| physical parameters and cell identification; the Random Access | 1. the Broadcast Control Channel (BCCH), where LDACS ground stations | |||
| Channel (RACH) where LDACS airborne radios can request access to an | announce their specific LDACS cell, including physical parameters | |||
| LDACS cell; the Common Control Channel (CCCH) where LDACS ground | and cell identification; | |||
| stations allocate resources to aircraft radios, enabling the airborne | ||||
| side to transmit user payload; the Dedicated Control Channel (DCCH) | 2. the Random Access Channel (RACH), where LDACS airborne radios can | |||
| where LDACS airborne radios can request user data resources from the | request access to an LDACS cell; | |||
| LDACS ground station so the airborne side can transmit user payload. | ||||
| Communications between MAC and DLS layer is handled by the Data | 3. the Common Control Channel (CCCH), where LDACS ground stations | |||
| Channel (DCH) where user payload is handled. | allocate resources to aircraft radios, enabling the airborne side | |||
| to transmit the user payload; and | ||||
| 4. the Dedicated Control Channel (DCCH), where LDACS airborne radios | ||||
| can request user data resources from the LDACS ground station so | ||||
| the airborne side can transmit the user payload. | ||||
| Communications between the MAC and DLS layers is handled by the Data | ||||
| Channel (DCH) where the user payload is handled. | ||||
| Figure 10 shows the protocol stack of LDACS as implemented in the AS | Figure 10 shows the protocol stack of LDACS as implemented in the AS | |||
| and GS. | and GS. | |||
| IPv6 Network Layer | IPv6 Network Layer | |||
| | | | | |||
| | | | | |||
| +------------------+ +----+ | +------------------+ +----+ | |||
| | SNP |--| | Sub-Network | | SNP |--| | Subnetwork | |||
| | | | | Layer | | | | | Layer | |||
| +------------------+ | | | +------------------+ | | | |||
| | | LME| | | | LME| | |||
| +------------------+ | | | +------------------+ | | | |||
| | DLS | | | Logical Link | | DLS | | | Logical Link | |||
| | | | | Control Layer | | | | | Control Layer | |||
| +------------------+ +----+ | +------------------+ +----+ | |||
| | | | | | | |||
| DCH DCCH/CCCH | DCH DCCH/CCCH | |||
| | RACH/BCCH | | RACH/BCCH | |||
| skipping to change at page 51, line 34 ¶ | skipping to change at line 2288 ¶ | |||
| +--------------------------+ | +--------------------------+ | |||
| | | | | |||
| +--------------------------+ | +--------------------------+ | |||
| | PHY | Physical Layer | | PHY | Physical Layer | |||
| +--------------------------+ | +--------------------------+ | |||
| | | | | |||
| | | | | |||
| ((*)) | ((*)) | |||
| FL/RL radio channels | FL/RL radio channels | |||
| separated by | separated by | |||
| Frequency Division Duplex | frequency division duplex | |||
| Figure 10: LDACS protocol stack in AS and GS | Figure 10: LDACS Protocol Stack in AS and GS | |||
| 7.4.3. Radio (PHY) | 7.4.3. Radio (PHY) | |||
| The physical layer provides the means to transfer data over the radio | The physical layer provides the means to transfer data over the radio | |||
| channel. The LDACS ground-station supports bi-directional links to | channel. The LDACS ground station supports bidirectional links to | |||
| multiple aircraft under its control. The forward link direction (FL; | multiple aircraft under its control. The forward link direction | |||
| ground-to-air) and the reverse link direction (RL; air-to-ground) are | (which is ground to air) and the reverse link direction (which is air | |||
| separated by frequency division duplex. Forward link and reverse | to ground) are separated by frequency division duplex. Forward link | |||
| link use a 500 kHz channel each. The ground-station transmits a | and reverse link use a 500 kHz channel each. The ground station | |||
| continuous stream of OFDM symbols on the forward link. In the | transmits a continuous stream of OFDM symbols on the forward link. | |||
| reverse link different aircraft are separated in time and frequency | In the reverse link, different aircrafts are separated in time and | |||
| using a combination of Orthogonal Frequency-Division Multiple-Access | frequency using a combination of Orthogonal Frequency-Division | |||
| (OFDMA) and Time-Division Multiple-Access (TDMA). Aircraft thus | Multiple Access (OFDMA) and Time-Division Multiple-Access (TDMA). | |||
| transmit discontinuously on the reverse link with radio bursts sent | Thus, aircraft transmit discontinuously on the reverse link with | |||
| in precisely defined transmission opportunities allocated by the | radio bursts sent in precisely defined transmission opportunities | |||
| ground-station. The most important service on the PHY layer of LDACS | allocated by the ground station. The most important service on the | |||
| is the PHY time framing service, which indicates that the PHY layer | PHY layer of LDACS is the PHY time framing service, which indicates | |||
| is ready to transmit in a given slot and to indicate PHY layer | that the PHY layer is ready to transmit in a given slot and indicates | |||
| framing and timing to the MAC time framing service. LDACS does not | PHY layer framing and timing to the MAC time framing service. LDACS | |||
| support beam-forming or Multiple Input Multiple Output (MIMO). | does not support beam-forming or Multiple Input Multiple Output | |||
| (MIMO). | ||||
| 7.4.4. Scheduling, Frame Structure and QoS (MAC) | 7.4.4. Scheduling, Frame Structure, and QoS (MAC) | |||
| The data-link layer provides the necessary protocols to facilitate | The data link layer provides the necessary protocols to facilitate | |||
| concurrent and reliable data transfer for multiple users. The LDACS | concurrent and reliable data transfer for multiple users. The LDACS | |||
| data link layer is organized in two sub-layers: The medium access | data link layer is organized in two sublayers: the medium access | |||
| sub-layer and the logical link control sub-layer. The medium access | sublayer and the logical link control sublayer. The medium access | |||
| sub-layer manages the organization of transmission opportunities in | sublayer manages the organization of transmission opportunities in | |||
| slots of time and frequency. The logical link control sub-layer | slots of time and frequency. The logical link control sublayer | |||
| provides acknowledged point-to-point logical channels between the | provides acknowledged point-to-point logical channels between the | |||
| aircraft and the ground-station using an automatic repeat request | aircraft and the ground station using an automatic repeat request | |||
| protocol. LDACS supports also unacknowledged point-to-point channels | protocol. LDACS also supports unacknowledged point-to-point channels | |||
| and ground-to-air broadcast. Before going more into depth about the | and ground-to-air broadcast. | |||
| LDACS medium access, the frame structure of LDACS is introduced: | ||||
| Next, the frame structure of LDACS is introduced, followed by a more | ||||
| in-depth discussion of the LDACS medium access. | ||||
| The LDACS framing structure for FL and RL is based on Super-Frames | The LDACS framing structure for FL and RL is based on Super-Frames | |||
| (SF) of 240 ms duration. Each SF corresponds to 2000 OFDM symbols. | (SF) of 240 ms duration. Each SF corresponds to 2000 OFDM symbols. | |||
| The FL and RL SF boundaries are aligned in time (from the view of the | The FL and RL SF boundaries are aligned in time (from the view of the | |||
| GS). | GS). | |||
| In the FL, an SF contains a Broadcast Frame of duration 6.72 ms (56 | In the FL, an SF contains a broadcast frame with a duration of 6.72 | |||
| OFDM symbols) for the Broadcast Control Channel (BCCH), and four | ms (56 OFDM symbols) for the Broadcast Control Channel (BCCH) and | |||
| Multi-Frames (MF), each of duration 58.32 ms (486 OFDM symbols). | four Multi-Frames (MF), each with a duration of 58.32 ms (486 OFDM | |||
| symbols). | ||||
| In the RL, each SF starts with a Random Access (RA) slot of length | In the RL, each SF starts with a Random Access (RA) slot with a | |||
| 6.72 ms with two opportunities for sending RL random access frames | length of 6.72 ms with two opportunities for sending RL random access | |||
| for the Random Access Channel (RACH), followed by four MFs. These | frames for the Random Access Channel (RACH), followed by four MFs. | |||
| MFs have the same fixed duration of 58.32 ms as in the FL, but a | These MFs have the same fixed duration of 58.32 ms as in the FL but a | |||
| different internal structure | different internal structure. | |||
| Figure 11 and Figure 12 illustrate the LDACS frame structure. | Figures 11 and 12 illustrate the LDACS frame structure. This fixed | |||
| frame structure allows for the reliable and dependable transmission | ||||
| of data. | ||||
| ^ | ^ | |||
| | +------+------------+------------+------------+------------+ | | +------+------------+------------+------------+------------+ | |||
| | FL | BCCH | MF | MF | MF | MF | | | FL | BCCH | MF | MF | MF | MF | | |||
| F +------+------------+------------+------------+------------+ | F +------+------------+------------+------------+------------+ | |||
| r <---------------- Super-Frame (SF) - 240ms ----------------> | r <---------------- Super-Frame (SF) - 240 ms ---------------> | |||
| e | e | |||
| q +------+------------+------------+------------+------------+ | q +------+------------+------------+------------+------------+ | |||
| u RL | RACH | MF | MF | MF | MF | | u RL | RACH | MF | MF | MF | MF | | |||
| e +------+------------+------------+------------+------------+ | e +------+------------+------------+------------+------------+ | |||
| n <---------------- Super-Frame (SF) - 240ms ----------------> | n <---------------- Super-Frame (SF) - 240 ms ---------------> | |||
| c | c | |||
| y | y | |||
| | | | | |||
| ----------------------------- Time ------------------------------> | ----------------------------- Time ------------------------------> | |||
| | | | | |||
| Figure 11: SF structure for LDACS | Figure 11: SF Structure for LDACS | |||
| ^ | ^ | |||
| | +-------------+------+-------------+ | | +-------------+------+-------------+ | |||
| | FL | DCH | CCCH | DCH | | | FL | DCH | CCCH | DCH | | |||
| F +-------------+------+-------------+ | F +-------------+------+-------------+ | |||
| r <---- Multi-Frame (MF) - 58.32ms --> | r <--- Multi-Frame (MF) - 58.32 ms --> | |||
| e | e | |||
| q +------+---------------------------+ | q +------+---------------------------+ | |||
| u RL | DCCH | DCH | | u RL | DCCH | DCH | | |||
| e +------+---------------------------+ | e +------+---------------------------+ | |||
| n <---- Multi-Frame (MF) - 58.32ms --> | n <--- Multi-Frame (MF) - 58.32 ms --> | |||
| c | c | |||
| y | y | |||
| | | | | |||
| -------------------- Time ------------------> | -------------------- Time ------------------> | |||
| | | | | |||
| Figure 12: MF Structure for LDACS | Figure 12: MF Structure for LDACS | |||
| This fixed frame structure allows for a reliable and dependable | Next, the LDACS medium access layer is introduced. | |||
| transmission of data. Next, the LDACS medium access layer is | ||||
| introduced: | ||||
| LDACS medium access is always under the control of the ground-station | LDACS medium access is always under the control of the ground station | |||
| of a radio cell. Any medium access for the transmission of user data | of a radio cell. Any medium access for the transmission of user data | |||
| has to be requested with a resource request message stating the | has to be requested with a resource request message stating the | |||
| requested amount of resources and class of service. The ground- | requested amount of resources and class of service. The ground | |||
| station performs resource scheduling on the basis of these requests | station performs resource scheduling on the basis of these requests | |||
| and grants resources with resource allocation messages. Resource | and grants resources with resource allocation messages. Resource | |||
| request and allocation messages are exchanged over dedicated | request and allocation messages are exchanged over dedicated | |||
| contention-free control channels. | contention-free control channels. | |||
| LDACS has two mechanisms to request resources from the scheduler in | LDACS has two mechanisms to request resources from the scheduler in | |||
| the ground-station. Resources can either be requested "on demand", | the ground station. Resources can either be requested "on demand" or | |||
| or permanently allocated by a LDACS ground station, with a given | permanently allocated by a LDACS ground station with a given class of | |||
| class of service. On the forward link, this is done locally in the | service. On the forward link, this is done locally in the ground | |||
| ground-station, on the reverse link a dedicated contention-free | station; on the reverse link, a dedicated contention-free control | |||
| control channel is used (Dedicated Control Channel (DCCH); roughly 83 | channel is used (the Dedicated Control Channel (DCCH); roughly 83 | |||
| bit every 60 ms). A resource allocation is always announced in the | bits every 60 ms). A resource allocation is always announced in the | |||
| control channel of the forward link (Common Control Channel (CCCH); | control channel of the forward link (Common Control Channel (CCCH); | |||
| variable sized). Due to the spacing of the reverse link control | variable sized). Due to the spacing of the reverse link control | |||
| channels of every 60 ms, a medium access delay in the same order of | channels of every 60 ms, a medium access delay in the same order of | |||
| magnitude is to be expected. | magnitude is to be expected. | |||
| Resources can also be requested "permanently". The permanent | Resources can also be requested "permanently". The permanent | |||
| resource request mechanism supports requesting recurring resources in | resource request mechanism supports requesting recurring resources at | |||
| given time intervals. A permanent resource request has to be | given time intervals. A permanent resource request has to be | |||
| canceled by the user (or by the ground-station, which is always in | canceled by the user (or by the ground station, which is always in | |||
| control). User data transmissions over LDACS are therefore always | control). User data transmissions over LDACS are therefore always | |||
| scheduled by the ground-station, while control data uses statically | scheduled by the ground station, while control data uses statically | |||
| (i.e. at net entry) allocated recurring resources (DCCH and CCCH). | (i.e., at net entry) allocated recurring resources (DCCH and CCCH). | |||
| The current specification documents specify no scheduling algorithm. | The current specification documents specify no scheduling algorithm. | |||
| However performance evaluations so far have used strict priority | However, performance evaluations so far have used strict priority | |||
| scheduling and round robin for equal priorities for simplicity. In | scheduling and round robin for equal priorities for simplicity. In | |||
| the current prototype implementations LDACS classes of service are | the current prototype implementations, LDACS classes of service are | |||
| thus realized as priorities of medium access and not as flows. Note | thus realized as priorities of medium access and not as flows. Note | |||
| that this can starve out low priority flows. However, this is not | that this can starve out low-priority flows. However, this is not | |||
| seen as a big problem since safety related message always go first in | seen as a big problem since safety-related messages always go first | |||
| any case. Scheduling of reverse link resources is done in physical | in any case. Scheduling of reverse link resources is done in | |||
| Protocol Data Units (PDU) of 112 bit (or larger if more aggressive | physical Protocol Data Units (PDU) of 112 bits (or larger if more | |||
| coding and modulation is used). Scheduling on the forward link is | aggressive coding and modulation is used). Scheduling on the forward | |||
| done Byte-wise since the forward link is transmitted continuously by | link is done byte wise since the forward link is transmitted | |||
| the ground-station. | continuously by the ground station. | |||
| In order to support diversity, LDACS supports handovers to other | In order to support diversity, LDACS supports handovers to other | |||
| ground-stations on different channels. Handovers may be initiated by | ground stations on different channels. Handovers may be initiated by | |||
| the aircraft (break-before-make) or by the ground-station (make- | the aircraft (break before make) or by the ground station (make | |||
| before-break). Beyond this, FCI diversity shall be implemented by | before break). Beyond this, FCI diversity shall be implemented by | |||
| the multi-link concept. | the multi-link concept. | |||
| 8. IANA Considerations | 8. IANA Considerations | |||
| This specification does not require IANA action. | This document has no IANA actions. | |||
| 9. Security Considerations | 9. Security Considerations | |||
| Most RAW technologies integrate some authentication or encryption | Most RAW technologies integrate some authentication or encryption | |||
| mechanisms that were defined outside the IETF. The IETF | mechanisms that are defined outside the IETF. The IETF | |||
| specifications referenced herein each provide their own Security | specifications referenced herein each provide their own security | |||
| Considerations, and the lower layer technologies used provide their | considerations, and the lower-layer technologies used provide their | |||
| own security at Layer-2. | own security at Layer 2. | |||
| 10. Contributors | ||||
| This document aggregates articles from authors specialized in each | ||||
| technologies. Beyond the main authors listed in the front page, the | ||||
| following contributors proposed additional text and refinement that | ||||
| improved the document. | ||||
| Georgios Z. Papadopoulos: Contributed to the TSCH section. | ||||
| Nils Maeurer: Contributed to the LDACS section. | ||||
| Thomas Graeupl: Contributed to the LDACS section. | ||||
| Torsten Dudda, Alexey Shapin, and Sara Sandberg: Contributed to the | ||||
| 5G section. | ||||
| Rocco Di Taranto: Contributed to the Wi-Fi section | ||||
| Rute Sofia: Contributed to the Introduction and Terminology sections | ||||
| 11. Acknowledgments | ||||
| Many thanks to the participants of the RAW WG where a lot of the work | 10. References | |||
| discussed here happened, and Malcolm Smith for his review of the | ||||
| 802.11 section. Special thanks for post directorate and IESG | ||||
| reviewers, Roman Danyliw, Victoria Pritchard, Donald Eastlake, | ||||
| Mohamed Boucadair, Jiankang Yao, Shivan Kaul Sahib, Mallory Knodel, | ||||
| Ron Bonica, Ketan Talaulikar, Eric Vyncke, and Carlos Jesus Bernardos | ||||
| Cano. | ||||
| 12. Normative References | 10.1. Normative References | |||
| [RFC5673] Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T. | [RFC5673] Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T. | |||
| Phinney, "Industrial Routing Requirements in Low-Power and | Phinney, "Industrial Routing Requirements in Low-Power and | |||
| Lossy Networks", RFC 5673, DOI 10.17487/RFC5673, October | Lossy Networks", RFC 5673, DOI 10.17487/RFC5673, October | |||
| 2009, <https://www.rfc-editor.org/info/rfc5673>. | 2009, <https://www.rfc-editor.org/info/rfc5673>. | |||
| [RFC8557] Finn, N. and P. Thubert, "Deterministic Networking Problem | [RFC8557] Finn, N. and P. Thubert, "Deterministic Networking Problem | |||
| Statement", RFC 8557, DOI 10.17487/RFC8557, May 2019, | Statement", RFC 8557, DOI 10.17487/RFC8557, May 2019, | |||
| <https://www.rfc-editor.org/info/rfc8557>. | <https://www.rfc-editor.org/info/rfc8557>. | |||
| [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | |||
| "Deterministic Networking Architecture", RFC 8655, | "Deterministic Networking Architecture", RFC 8655, | |||
| DOI 10.17487/RFC8655, October 2019, | DOI 10.17487/RFC8655, October 2019, | |||
| <https://www.rfc-editor.org/info/rfc8655>. | <https://www.rfc-editor.org/info/rfc8655>. | |||
| [I-D.ietf-raw-architecture] | [RFC9912] Thubert, P., Ed., "Reliable and Available Wireless (RAW) | |||
| Thubert, P., "Reliable and Available Wireless | Architecture", RFC 9912, DOI 10.17487/RFC9912, February | |||
| Architecture", Work in Progress, Internet-Draft, draft- | 2026, <https://www.rfc-editor.org/info/rfc9912>. | |||
| ietf-raw-architecture-24, 28 February 2025, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-raw- | ||||
| architecture-24>. | ||||
| 13. Informative References | 10.2. Informative References | |||
| [RFC9030] Thubert, P., Ed., "An Architecture for IPv6 over the Time- | [RFC9030] Thubert, P., Ed., "An Architecture for IPv6 over the Time- | |||
| Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)", | Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)", | |||
| RFC 9030, DOI 10.17487/RFC9030, May 2021, | RFC 9030, DOI 10.17487/RFC9030, May 2021, | |||
| <https://www.rfc-editor.org/info/rfc9030>. | <https://www.rfc-editor.org/info/rfc9030>. | |||
| [RFC8480] Wang, Q., Ed., Vilajosana, X., and T. Watteyne, "6TiSCH | [RFC8480] Wang, Q., Ed., Vilajosana, X., and T. Watteyne, "6TiSCH | |||
| Operation Sublayer (6top) Protocol (6P)", RFC 8480, | Operation Sublayer (6top) Protocol (6P)", RFC 8480, | |||
| DOI 10.17487/RFC8480, November 2018, | DOI 10.17487/RFC8480, November 2018, | |||
| <https://www.rfc-editor.org/info/rfc8480>. | <https://www.rfc-editor.org/info/rfc8480>. | |||
| skipping to change at page 58, line 5 ¶ | skipping to change at line 2537 ¶ | |||
| "Deterministic Networking (DetNet) Data Plane: IP over | "Deterministic Networking (DetNet) Data Plane: IP over | |||
| IEEE 802.1 Time-Sensitive Networking (TSN)", RFC 9023, | IEEE 802.1 Time-Sensitive Networking (TSN)", RFC 9023, | |||
| DOI 10.17487/RFC9023, June 2021, | DOI 10.17487/RFC9023, June 2021, | |||
| <https://www.rfc-editor.org/info/rfc9023>. | <https://www.rfc-editor.org/info/rfc9023>. | |||
| [RFC9262] Eckert, T., Ed., Menth, M., and G. Cauchie, "Tree | [RFC9262] Eckert, T., Ed., Menth, M., and G. Cauchie, "Tree | |||
| Engineering for Bit Index Explicit Replication (BIER-TE)", | Engineering for Bit Index Explicit Replication (BIER-TE)", | |||
| RFC 9262, DOI 10.17487/RFC9262, October 2022, | RFC 9262, DOI 10.17487/RFC9262, October 2022, | |||
| <https://www.rfc-editor.org/info/rfc9262>. | <https://www.rfc-editor.org/info/rfc9262>. | |||
| [I-D.ietf-roll-nsa-extension] | [NSA-EXT] Koutsiamanis, R., Ed., Papadopoulos, G. Z., Montavont, N., | |||
| Koutsiamanis, R., Papadopoulos, G. Z., Montavont, N., and | and P. Thubert, "Common Ancestor Objective Function and | |||
| P. Thubert, "Common Ancestor Objective Function and Parent | Parent Set DAG Metric Container Extension", Work in | |||
| Set DAG Metric Container Extension", Work in Progress, | Progress, Internet-Draft, draft-ietf-roll-nsa-extension- | |||
| Internet-Draft, draft-ietf-roll-nsa-extension-12, 8 | 13, 7 July 2025, <https://datatracker.ietf.org/doc/html/ | |||
| November 2023, <https://datatracker.ietf.org/doc/html/ | draft-ietf-roll-nsa-extension-13>. | |||
| draft-ietf-roll-nsa-extension-12>. | ||||
| [I-D.ietf-roll-dao-projection] | [RFC9914] Thubert, P., Ed., Jadhav, R.A., and M. Richardson, "Root- | |||
| Thubert, P., Jadhav, R., and M. Richardson, "Root- | Initiated Routing State in the Routing Protocol for Low- | |||
| initiated Routing State in RPL", Work in Progress, | Power and Lossy Networks (RPL)", RFC 9914, | |||
| Internet-Draft, draft-ietf-roll-dao-projection-40, 11 | DOI 10.17487/RFC9914, February 2026, | |||
| March 2025, <https://datatracker.ietf.org/doc/html/draft- | <https://www.rfc-editor.org/info/rfc9914>. | |||
| ietf-roll-dao-projection-40>. | ||||
| [I-D.ietf-6tisch-coap] | [CoAP-6TiSCH] | |||
| Sudhaakar, R. S. and P. Zand, "6TiSCH Resource Management | Sudhaakar, R. S., Ed. and P. Zand, "6TiSCH Resource | |||
| and Interaction using CoAP", Work in Progress, Internet- | Management and Interaction using CoAP", Work in Progress, | |||
| Draft, draft-ietf-6tisch-coap-03, 9 March 2015, | Internet-Draft, draft-ietf-6tisch-coap-03, 9 March 2015, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-6tisch- | <https://datatracker.ietf.org/doc/html/draft-ietf-6tisch- | |||
| coap-03>. | coap-03>. | |||
| [IEEE Std 802.15.4] | [IEEE802.15.4] | |||
| IEEE standard for Information Technology, "IEEE Std | IEEE, "IEEE Standard for Low-Rate Wireless Networks", IEEE | |||
| 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | Std 802.15.4-2015, DOI 10.1109/IEEESTD.2016.7460875, | |||
| and Physical Layer (PHY) Specifications for Low-Rate | <https://doi.org/10.1109/IEEESTD.2016.7460875>. | |||
| Wireless Personal Area Networks". | ||||
| [IEEE Std 802.11] | [IEEE802.11] | |||
| IEEE standard for Information Technology, "IEEE Standard | IEEE, "IEEE Standard for Information Technology -- | |||
| 802.11 - IEEE Standard for Information Technology - | Telecommunications and Information Exchange between | |||
| Telecommunications and information exchange between | Systems - Local and Metropolitan Area Networks -- Specific | |||
| systems Local and metropolitan area networks - Specific | Requirements - Part 11: Wireless LAN Medium Access Control | |||
| requirements - Part 11: Wireless LAN Medium Access Control | (MAC) and Physical Layer (PHY) Specifications", IEEE | |||
| (MAC) and Physical Layer (PHY) Specifications.", | Std 802.11-2020, DOI 10.1109/IEEESTD.2021.9363693, 2020, | |||
| <https://ieeexplore.ieee.org/document/9363693>. | <https://ieeexplore.ieee.org/document/9363693>. | |||
| [IEEE Std 802.11ax] | [IEEE802.11ax] | |||
| IEEE standard for Information Technology, "802.11ax: | IEEE, "IEEE Standard for Information Technology -- | |||
| Enhancements for High Efficiency WLAN", 2021, | Telecommunications and Information Exchange between | |||
| Systems Local and Metropolitan Area Networks -- Specific | ||||
| Requirements Part 11: Wireless LAN Medium Access Control | ||||
| (MAC) and Physical Layer (PHY) Specifications Amendment 1: | ||||
| Enhancements for High-Efficiency WLAN", IEEE Std 802.11ax- | ||||
| 2021, DOI 10.1109/IEEESTD.2021.9442429, 2021, | ||||
| <https://ieeexplore.ieee.org/document/9442429>. | <https://ieeexplore.ieee.org/document/9442429>. | |||
| [IEEE Std 802.11ay] | [IEEE802.11ay] | |||
| IEEE standard for Information Technology, "802.11ay: | IEEE, "IEEE Standard for Information Technology -- | |||
| Enhanced throughput for operation in license-exempt bands | Telecommunications and Information Exchange between | |||
| above 45 GHz", 2021, | Systems Local and Metropolitan Area Networks -- Specific | |||
| Requirements Part 11: Wireless LAN Medium Access Control | ||||
| (MAC) and Physical Layer (PHY) Specifications Amendment 2: | ||||
| Enhanced Throughput for Operation in License-exempt Bands | ||||
| above 45 GHz", IEEE Std 802.11ay-2021, | ||||
| DOI 10.1109/IEEESTD.2021.9502046, 2021, | ||||
| <https://ieeexplore.ieee.org/document/9502046/>. | <https://ieeexplore.ieee.org/document/9502046/>. | |||
| [IEEE Std 802.11ad] | [IEEE802.11ad] | |||
| "802.11ad: Enhancements for very high throughput in the 60 | IEEE, "IEEE Standard for Information technology -- | |||
| GHz band", 2012, | Telecommunications and information exchange between | |||
| systems -- Local and metropolitan area networks -- | ||||
| Specific requirements-Part 11: Wireless LAN Medium Access | ||||
| Control (MAC) and Physical Layer (PHY) Specifications | ||||
| Amendment 3: Enhancements for Very High Throughput in the | ||||
| 60 GHz Band", IEEE Std 802.11ad-2012, | ||||
| DOI 10.1109/IEEESTD.2012.6392842, 2012, | ||||
| <https://ieeexplore.ieee.org/document/6392842/>. | <https://ieeexplore.ieee.org/document/6392842/>. | |||
| [IEEE 802.11be] | [IEEE802.11be] | |||
| IEEE standard for Information Technology, "802.11be: | IEEE, "IEEE Standard for Information technology -- | |||
| Extreme High Throughput PAR", | Telecommunications and information exchange between | |||
| <https://mentor.ieee.org/802.11/dcn/18/11-18-1231-04-0eht- | systems Local and metropolitan area networks -- Specific | |||
| eht-draft-proposed-par.docx>. | requirements - Part 11: Wireless LAN Medium Access Control | |||
| (MAC) and Physical Layer (PHY) Specifications Amendment 2: | ||||
| Enhancements for Extremely High Throughput (EHT)", IEEE | ||||
| Std 802.11be-2024, DOI 10.1109/IEEESTD.2024.11090080, | ||||
| <https://ieeexplore.ieee.org/document/11090080>. | ||||
| [IEEE Std 802.1Qat] | [IEEE802.1Qat] | |||
| "802.1Qat: Stream Reservation Protocol". | IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks -- Virtual Bridged Local Area Networks Amendment | ||||
| 14: Stream Reservation Protocol (SRP)", IEEE Std 802.1Qat- | ||||
| 2010, DOI 10.1109/IEEESTD.2010.5594972, | ||||
| <https://doi.org/10.1109/IEEESTD.2010.5594972>. | ||||
| [Cavalcanti_2019] | [Cavalcanti_2019] | |||
| Dave Cavalcanti et al., "Extending Time Distribution and | Cavalcanti, D., Perez-Ramirez, J., Rashid, M. M., Fang, | |||
| Timeliness Capabilities over the Air to Enable Future | J., Galeev, M., and K. B. Stanton, "Extending Accurate | |||
| Wireless Industrial Automation Systems, the Proceedings of | Time Distribution and Timeliness Capabilities Over the Air | |||
| IEEE", June 2019. | to Enable Future Wireless Industrial Automation Systems", | |||
| Proceedings of the IEEE, vol. 107, no. 6, pp. 1132-1152, | ||||
| DOI 10.1109/JPROC.2019.2903414, June 2019, | ||||
| <https://doi.org/10.1109/JPROC.2019.2903414>. | ||||
| [Nitsche_2015] | [Nitsche_2015] | |||
| Thomas Nitsche et al., "IEEE 802.11ad: directional 60 GHz | Nitsche, T., Cordeiro, C., Flores, A. B., Knightly, E. W., | |||
| communication for multi-Gigabit-per-second Wi-Fi", | Perahia, E., and J. C. Widmer, "IEEE 802.11ad: directional | |||
| December 2014. | 60 GHz communication for multi-Gigabit-per-second Wi-Fi", | |||
| IEEE Communications Magazine, vol. 52, no. 12, pp. | ||||
| 132-141, DOI 10.1109/MCOM.2014.6979964, December 2014, | ||||
| <https://doi.org/10.1109/MCOM.2014.6979964>. | ||||
| [Ghasempour_2017] | [Ghasempour_2017] | |||
| Yasaman Ghasempour et al., "802.11ay: Next-Generation 60 | Ghasempour, Y., Silva, C. R. C. M. D., Cordeiro, C., and | |||
| GHz Communications for 100 Gb/s Wi-Fi", December 2017. | E. W. Knightly, "802.11ay: Next-Generation 60 GHz | |||
| Communications for 100 Gb/s Wi-Fi", IEEE Communications | ||||
| Magazine, vol. 55, no. 12, pp. 186-192, | ||||
| DOI 10.1109/MCOM.2017.1700393, December 2017, | ||||
| <https://doi.org/10.1109/MCOM.2017.1700393>. | ||||
| [IEEE_doc_11-18-2009-06] | [IEEE_doc_11-18-2009-06] | |||
| IEEE standard for Information Technology, "802.11 Real- | IEEE, "802.11 Real-Time Applications (RTA) Topic Interest | |||
| Time Applications (RTA) Topic Interest Group (TIG) | Group (TIG) Report", November 2018, | |||
| Report", November 2018. | <https://mentor.ieee.org/802.11/dcn/18/11-18-2009-06-0rta- | |||
| rta-report-draft.docx>. | ||||
| [vilajosana21] | [vilajosana21] | |||
| Xavier Vilajosana et al., "IETF 6TiSCH: A Tutorial", March | Vilajosana, X., Watteyne, T., Chang, T., Vucinic, M., | |||
| 2021, <https://inria.hal.science/hal-02420974/file/ | Duquennoy, S., and P. Thubert, "IETF 6TiSCH: A Tutorial", | |||
| Communications Surveys and Tutorials, IEEE Communications | ||||
| Society, HAL ID: hal-02420974, | ||||
| DOI 10.1109/COMST.2019.2939407, December 2019, | ||||
| <https://inria.hal.science/hal-02420974/file/ | ||||
| IETF_6TiSCH__A_Tutorial__17099609gkvsxdpffdvc_%20(1).pdf>. | IETF_6TiSCH__A_Tutorial__17099609gkvsxdpffdvc_%20(1).pdf>. | |||
| [ISA100.11a] | [ISA100.11a] | |||
| ISA/IEC, "ISA100.11a, Wireless Systems for Automation, | ISA, "ISA100 Wireless", ANSI/ISA-100.11a-2011 (IEC 26743), | |||
| also IEC 62734", 2011, <http://www.isa100wci.org/en- | <https://isa100wci.org/about-isa100-wireless?_gl=1*19xrxgo | |||
| US/Documents/PDF/3405-ISA100-WirelessSystems-Future-broch- | *_up*MQ..*_ga*NDczNjkxOTQ1LjE3NjI0NjQ2NDk.*_ga_L2KSW4EHCS* | |||
| WEB-ETSI.aspx>. | czE3NjI0NjQ2NDkkbzEkZzEkdDE3NjI0NjQ3MzQkajYwJGwwJGgw>. | |||
| [WirelessHART] | [WirelessHART] | |||
| www.hartcomm.org, "Industrial Communication Networks - | FieldComm Group, "WirelessHART", | |||
| Wireless Communication Network and Communication Profiles | <https://www.fieldcommgroup.org/technologies/ | |||
| - WirelessHART - IEC 62591", 2010. | wirelesshart>. | |||
| [WFA] www.wi-fi.org, "Wi-Fi Alliance". | [WFA] "Wi-Fi Alliance", <https://www.wi-fi.org>. | |||
| [Avnu] avnu.org, "Avnu Alliance". | [Avnu] "Avnu Alliance", <https://www.avnu.org>. | |||
| [PCE] IETF, "Path Computation Element", | [PCE] IETF, "Path Computation Element", | |||
| <https://dataTracker.ietf.org/doc/charter-ietf-pce/>. | <https://datatracker.ietf.org/doc/charter-ietf-pce/>. | |||
| [CCAMP] IETF, "Common Control and Measurement Plane", | [CCAMP] IETF, "Common Control and Measurement Plane", | |||
| <https://dataTracker.ietf.org/doc/charter-ietf-ccamp/>. | <https://datatracker.ietf.org/doc/charter-ietf-ccamp/>. | |||
| [TiSCH] IETF, "IPv6 over the TSCH mode over 802.15.4", | [TiSCH] IETF, "IPv6 over the TSCH mode over 802.15.4e", | |||
| <https://dataTracker.ietf.org/doc/charter-ietf-6tisch/>. | <https://datatracker.ietf.org/doc/charter-ietf-6tisch/>. | |||
| [RIH18] Rihacek, C., Haindl, B., Fantappie, P., Pierattelli, S., | [RIH18] Rihacek, C., Haindl, B., Fantappie, P., Pierattelli, S., | |||
| Gräupl, T., Schnell, M., and N. Fistas, "L-band Digital | Gräupl, T., Schnell, M., and N. Fistas, "L-band Digital | |||
| Aeronautical Communications System (LDACS) Activities in | Aeronautical Communications System (LDACS) Activities in | |||
| SESAR2020", Proceedings of the Integrated Communications | SESAR2020", 2018 Integrated Communications, Navigation, | |||
| Navigation and Surveillance Conference (ICNS) Herndon, VA, | Surveillance Conference (ICNS), pp. 4A1-1-4A1-8, | |||
| USA, April 2018. | DOI 10.1109/ICNSURV.2018.8384880, April 2018, | |||
| <https://doi.org/10.1109/ICNSURV.2018.8384880>. | ||||
| [GRA19] Gräupl, T., Rihacek, C., and B. Haindl, "LDACS A/G | [GRA19] Gräupl, T., Rihacek, C., Haindl, B., and Q. Parrod, | |||
| Specification", SESAR2020 PJ14-02-01 D3.3.010, February | "SESAR2020 - PJ14-02-01 - LDACS A/G SPECIFICATION", | |||
| 2019. | EDITION 00.02.02, 16 August 2019, <https://www.ldacs.com/ | |||
| wp-content/uploads/2013/12/SESAR2020_PJ14_D3_3_030_LDACS_A | ||||
| G_Specification_00_02_02-1_0.pdf>. | ||||
| [SAJ14] al, B. H. A., "LDACS1 conformance and compatibility | [SAJ14] Haindl, B., Meser, J., Sajatovic, M., Muller, S., | |||
| assessment", IEEE/AIAA 33rd Digital Avionics Systems | Arthaber, H., Faseth, T., and M. Zaisberger, "LDACS1 | |||
| Conference (DASC) DOI 10.1109/DASC.2014.6979447, October | conformance and compatibility assessment", 2014 IEEE/AIAA | |||
| 2014. | 33rd Digital Avionics Systems Conference (DASC), pp. | |||
| 3B3-1-3B3-11, DOI 10.1109/DASC.2014.6979447, October 2014, | ||||
| <https://doi.org/10.1109/DASC.2014.6979447>. | ||||
| [GRA11] Gräupl, T. and M. Ehammer, "L-DACS1 Data Link Layer | [GRA11] Gräupl, T., "LDACS1 Data Link Layer Evolution of ATN/IPS", | |||
| Evolution of ATN/IPS", Proceedings of the 30th IEEE/AIAA | IEEE/AIAA 30th Digital Avionics Systems Conference, pp. | |||
| Digital Avionics Systems Conference (DASC) Seattle, WA, | 1-28, DOI 10.1109/DASC.2011.6096230, October 2011, | |||
| USA, October 2011. | <https://doi.org/10.1109/DASC.2011.6096230>. | |||
| [ICAO18] International Civil Aviation Organization (ICAO), "L-Band | [ICAO18] International Civil Aviation Organization (ICAO), "L-Band | |||
| Digital Aeronautical Communication System (LDACS)", | Digital Aeronautical Communication System (LDACS)", | |||
| International Standards and Recommended Practices Annex 10 | International Standards and Recommended Practices, Annex | |||
| - Aeronautical Telecommunications, Vol. III - | 10 - Aeronautical Telecommunications, Vol. III - | |||
| Communication Systems, July 2018. | Communication Systems, July 2018, | |||
| <https://elibrary.icao.int/product/279816>. | ||||
| [GRA18] al., T. G. E., "L-band Digital Aeronautical Communications | [GRA18] Gräupl, T., Schneckenburger, N., Jost, T., Schnell, M., | |||
| System (LDACS) flight trials in the national German | Filip, A., Bellido-Manganell, M. A., Mielke, D. M., | |||
| project MICONAV", Proceedings of the Integrated | Mäurer, N., Kumar, R., Osechas, O., and G. Battista, | |||
| Communications, Navigation, Surveillance Conference | "L-band Digital Aeronautical Communications System (LDACS) | |||
| (ICNS) Herndon, VA, USA, April 2018. | flight trials in the national German project MICONAV", | |||
| 2018 Integrated Communications, Navigation, Surveillance | ||||
| Conference (ICNS), pp. 4A2-1-4A2-7, | ||||
| DOI 10.1109/ICNSURV.2018.8384881, April 2018, | ||||
| <https://doi.org/10.1109/ICNSURV.2018.8384881>. | ||||
| [BEL22] al, B. M. A., "LDACS Flight Trials: Demonstration of ATS- | [BEL22] Bellido-Manganell, M. A., Gräupl, T., Heirich, O., Mäurer, | |||
| B2, IPS, and Seamless Mobility", IEEE Transactions on | N., Filip-Dhaubhadel, A., Mielke, D. M., Schalk, L. M., | |||
| Aerospace and Electronic Systems, vol. 58 DOI | Becker, D., Schneckenburger, N., and M. Schnell, "LDACS | |||
| 10.1109/TAES.2021.3111722, 2022. | Flight Trials: Demonstration and Performance Analysis of | |||
| the Future Aeronautical Communications System", IEEE | ||||
| Transactions on Aerospace and Electronic Systems, vol. 58, | ||||
| no. 1, pp. 615-634, DOI 10.1109/TAES.2021.3111722, | ||||
| February 2022, | ||||
| <https://doi.org/10.1109/TAES.2021.3111722>. | ||||
| [GRA23] al, G. T. A., "LDACS Flight Trials: Demonstration of ATS- | [GRA23] Gräupl, T., Mielke, D. M., Bellido-Manganell, M. A., | |||
| B2, IPS, and Seamless Mobility", Proceedings of the 2023 | Jansen, L. J., Mäurer, N., Gürbüz, A., Filip-Dhaubhadel, | |||
| A., Schalk, L., Becker, D., Skorepa, M., Wrobel, F., | ||||
| Morioka, K., Kurz, S., and J. Meser, "LDACS Flight Trials: | ||||
| Demonstration of ATS-B2, IPS, and Seamless Mobility", 2023 | ||||
| Integrated Communication, Navigation and Surveillance | Integrated Communication, Navigation and Surveillance | |||
| Conference (ICNS), Herndon, VA, USA DOI | Conference (ICNS), pp. 1-13, | |||
| 10.1109/ICNS58246.2023.10124329, 2023. | DOI 10.1109/ICNS58246.2023.10124329, 2023, | |||
| <https://doi.org/10.1109/ICNS58246.2023.10124329>. | ||||
| [TR37910] 3GPP, "Study on self evaluation towards IMT-2020 | [TR37910] 3GPP, "Study on self evaluation towards IMT-2020 | |||
| submission", 3GPP TR 37.910, | submission", 3GPP TR 37.910, | |||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3190>. | SpecificationDetails.aspx?specificationId=3190>. | |||
| [TR38824] 3GPP, "Study on physical layer enhancements for NR ultra- | [TR38824] 3GPP, "Study on physical layer enhancements for NR ultra- | |||
| reliable and low latency case (URLLC)", 3GPP TR 38.824, | reliable and low latency case (URLLC)", 3GPP TR 38.824, | |||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3498>. | SpecificationDetails.aspx?specificationId=3498>. | |||
| skipping to change at page 62, line 5 ¶ | skipping to change at line 2777 ¶ | |||
| [TR22804] 3GPP, "Study on Communication for Automation in Vertical | [TR22804] 3GPP, "Study on Communication for Automation in Vertical | |||
| domains (CAV)", 3GPP TS 22.804, | domains (CAV)", 3GPP TS 22.804, | |||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3187>. | SpecificationDetails.aspx?specificationId=3187>. | |||
| [TS23501] 3GPP, "System architecture for the 5G System (5GS)", | [TS23501] 3GPP, "System architecture for the 5G System (5GS)", | |||
| 3GPP TS 23.501, | 3GPP TS 23.501, | |||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3144>. | SpecificationDetails.aspx?specificationId=3144>. | |||
| [TS38300] 3GPP, "NR Overall description", 3GPP TS 38.300, | [TS38300] 3GPP, "NR; NR and NG-RAN Overall description; Stage-2", | |||
| 3GPP TS 38.300, | ||||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3191>. | SpecificationDetails.aspx?specificationId=3191>. | |||
| [SYSTOVER5G] | [SYSTOVER5G] | |||
| 3GPP, "5G system overview", | 3GPP, "5G System Overview", 8 August 2022, | |||
| <https://www.3gpp.org/technologies/5g-system-overview>. | <https://www.3gpp.org/technologies/5g-system-overview>. | |||
| [RP210854] 3GPP, "Revised WID: Enhanced Industrial Internet of Things | [RP210854] 3GPP, "Revised WID: Enhanced Industrial Internet of Things | |||
| (IoT) and ultra-reliable and low latency communication | (IoT) and ultra-reliable and low latency communication | |||
| (URLLC) support for NR", 3GPP RP-210854, March 2021, | (URLLC) support for NR", 3GPP RP-210854, March 2021, | |||
| <https://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_91e/Docs/ | <https://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_91e/Docs/ | |||
| RP-210854.zip>. | RP-210854.zip>. | |||
| [TR2370046] | [TR2370046] | |||
| 3GPP, "Study on 5GS DetNet interworking", | 3GPP, "Study on 5GS Deterministic Networking (DetNet) | |||
| 3GPP TR23.700-46, August 2022, | interworking", 3GPP TR 23.700-46, | |||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3994>. | SpecificationDetails.aspx?specificationId=3994>. | |||
| [SP211634] 3GPP, "Study on 5G Timing Resiliency, TSC, and URLLC | [SP211634] 3GPP, "Study on 5G Timing Resiliency, TSC, and URLLC | |||
| enhancements", 3GPP SP-211634, December 2021, | enhancements", 3GPP SP-211634, December 2021, | |||
| <https://www.3gpp.org/ftp/tsg_sa/TSG_SA/ | <https://www.3gpp.org/ftp/tsg_sa/TSG_SA/ | |||
| TSGS_94E_Electronic_2021_12/Docs/SP-211634.zip>. | TSGS_94E_Electronic_2021_12/Docs/SP-211634.zip>. | |||
| [IMT2020] "ITU towards IMT for 2020 and beyond", | [IMT2020] ITU, "IMT-2020 (a.k.a. "5G")", <https://www.itu.int/en/ | |||
| <https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt- | ITU-R/study-groups/rsg5/rwp5d/imt-2020/Pages/ | |||
| 2020/Pages/default.aspx>. | default.aspx>. | |||
| [IEEE802.1TSN] | [IEEE802.1TSN] | |||
| IEEE 802.1, "Time-Sensitive Networking (TSN) Task Group", | IEEE 802.1 Working Group, "Time-Sensitive Networking Task | |||
| <http://www.ieee802.org/1/pages/tsn.html>. | Group", <http://www.ieee802.org/1/pages/tsn.html>. | |||
| [IEEE802.1AS] | [IEEE802.1AS] | |||
| IEEE, "IEEE Standard for Local and metropolitan area | IEEE, "IEEE Standard for Local and Metropolitan Area | |||
| networks -- Timing and Synchronization for Time-Sensitive | Networks -- Timing and Synchronization for Time-Sensitive | |||
| Applications", IEEE 802.1AS-2020, | Applications", IEEE Std 802.1AS-2020, | |||
| <https://standards.ieee.org/content/ieee-standards/en/ | DOI 10.1109/IEEESTD.2020.9121845, | |||
| standard/802_1AS-2020.html>. | <https://doi.org/10.1109/IEEESTD.2020.9121845>. | |||
| [IEEE802.1CB] | [IEEE802.1CB] | |||
| IEEE, "IEEE Standard for Local and metropolitan area | IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks -- Frame Replication and Elimination for | networks -- Frame Replication and Elimination for | |||
| Reliability", DOI 10.1109/IEEEStd2017.8091139, IEEE | Reliability", IEEE Std 802.1CB-2017, | |||
| 802.1CB-2017, | DOI 10.1109/IEEEStd2017.8091139, 2017, | |||
| <https://ieeexplore.ieee.org/document/8091139>. | <https://ieeexplore.ieee.org/document/8091139>. | |||
| [IEEE802.1Qbv] | [IEEE802.1Qbv] | |||
| IEEE, "IEEE Standard for Local and metropolitan area | IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks -- Bridges and Bridged Networks -- Amendment 25: | networks -- Bridges and Bridged Networks - Amendment 25: | |||
| Enhancements for Scheduled Traffic", IEEE 802.1Qbv-2015, | Enhancements for Scheduled Traffic", IEEE Std 802.1Qbv- | |||
| <https://ieeexplore.ieee.org/document/7440741>. | 2015, DOI 10.1109/IEEESTD.2016.8613095, 2016, | |||
| <https://doi.org/10.1109/IEEESTD.2016.8613095>. | ||||
| [IEEE802.1Qcc] | [IEEE802.1Qcc] | |||
| IEEE, "IEEE Standard for Local and metropolitan area | IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks -- Bridges and Bridged Networks -- Amendment 31: | networks -- Bridges and Bridged Networks -- Amendment 31: | |||
| Stream Reservation Protocol (SRP) Enhancements and | Stream Reservation Protocol (SRP) Enhancements and | |||
| Performance Improvements", IEEE 802.1Qcc-2018, | Performance Improvements", IEEE Std 802.1Qcc-2018, | |||
| DOI 10.1109/IEEESTD.2018.8514112, | ||||
| <https://ieeexplore.ieee.org/document/8514112>. | <https://ieeexplore.ieee.org/document/8514112>. | |||
| [IEEE802.3] | [IEEE802.3] | |||
| IEEE, "IEEE Standard for Ethernet", IEEE 802.3-2018, | IEEE, "IEEE Standard for Ethernet", IEEE Std 802.3-2018, | |||
| DOI 10.1109/IEEESTD.2018.8457469, | ||||
| <https://ieeexplore.ieee.org/document/8457469>. | <https://ieeexplore.ieee.org/document/8457469>. | |||
| [TSN5G] 5G-ACIA, "Integration of 5G with Time-Sensitive Networking | [TSN5G] 5G-ACIA, "Integration of 5G with Time-Sensitive Networking | |||
| for Industrial Communications", 5G-ACIA whitepaper, | for Industrial Communications", 5G-ACIA White Paper, | |||
| <https://5g-acia.org/whitepapers/integration-of-5g-with- | <https://5g-acia.org/whitepapers/integration-of-5g-with- | |||
| time-sensitive-networking-for-industrial-communications>. | time-sensitive-networking-for-industrial-communications>. | |||
| [MAE18] Maeurer, N. and A. Bilzhause, "A Cybersecurity | [MAE18] Maeurer, N. and A. Bilzhause, "A Cybersecurity | |||
| Architecture for the L-band Digital Aeronautical | Architecture for the L-band Digital Aeronautical | |||
| Communications System (LDACS)", IEEE 37th Digital Avionics | Communications System (LDACS)", 2018 IEEE/AIAA 37th | |||
| Systems Conference (DASC), pp. 1-10, London, UK , 2017. | Digital Avionics Systems Conference (DASC), pp. 1-10, | |||
| DOI 10.1109/DASC.2018.8569878, 2018, | ||||
| <https://doi.org/10.1109/DASC.2018.8569878>. | ||||
| [MAE191] Maeurer, N. and C. Schmitt, "Towards Successful | [MAE191] Maeurer, N. and C. Schmitt, "Towards Successful | |||
| Realization of the LDACS Cybersecurity Architecture: An | Realization of the LDACS Cybersecurity Architecture: An | |||
| Updated Datalink Security Threat- and Risk Analysis", IEEE | Updated Datalink Security Threat- and Risk Analysis", | |||
| Integrated Communications, Navigation and Surveillance | Integrated Communications, Navigation and Surveillance | |||
| Conference (ICNS), pp. 1-13, Herndon, VA, USA , 2019. | Conference (ICNS), pp. 1-13, | |||
| DOI 10.1109/ICNSURV.2019.8735139, 2019, | ||||
| <https://doi.org/10.1109/ICNSURV.2019.8735139>. | ||||
| [ICAO19] International Civil Aviation Organization (ICAO), "TLDACS | [ICAO19] International Civil Aviation Organization (ICAO), "TLDACS | |||
| White Paper–A Roll-out Scenario", Working Paper | White Paper - A Roll-out Scenario", Communications Panel - | |||
| COMMUNICATIONS PANEL–DATA COMMUNICATIONS INFRASTRUCTURE | Data Communications Infrastructure Working Group, October | |||
| WORKING GROUP, Montreal, Canada , October 2019. | 2019, <https://www.ldacs.com/wp-content/uploads/2013/12/ | |||
| ACP-DCIWG-IP01-LDACS-White-Paper.pdf>. | ||||
| [MAE192] Maeurer, N., Graeupl, T., and C. Schmitt, "Evaluation of | [MAE192] Maeurer, N., Graeupl, T., and C. Schmitt, "Evaluation of | |||
| the LDACS Cybersecurity Implementation", IEEE 38th Digital | the LDACS Cybersecurity Implementation", IEEE/AIAA 38th | |||
| Avionics Systems Conference (DACS), pp. 1-10, San Diego, | Digital Avionics Systems Conference (DASC), pp. 1-10, | |||
| CA, USA , September 2019. | DOI 10.1109/DASC43569.2019.9081786, September 2019, | |||
| <https://doi.org/10.1109/DASC43569.2019.9081786>. | ||||
| [MAE20] Maeurer, N., Graeupl, T., and C. Schmitt, "Comparing | [MAE20] Maeurer, N., Graeupl, T., Gentsch, C., and C. Schmitt, | |||
| Different Diffie-Hellman Key Exchange Flavors for LDACS", | "Comparing Different Diffie-Hellman Key Exchange Flavors | |||
| IEEE 39th Digital Avionics Systems Conference (DACS), pp. | for LDACS", AIAA/IEEE 39th Digital Avionics Systems | |||
| 1-10, San Diego, CA, USA , October 2019. | Conference (DASC), pp. 1-10, | |||
| DOI 10.1109/DASC50938.2020.9256746, 2020, | ||||
| <https://doi.org/10.1109/DASC50938.2020.9256746>. | ||||
| [FIL19] Filip-Dhaubhadel, A. and D. Shutin, "LDACS- Based Non- | [FIL19] Filip-Dhaubhadel, A. and D. Shutin, "LDACS- Based Non- | |||
| Cooperative Surveillance Multistatic Radar Design and | Cooperative Surveillance Multistatic Radar Design and | |||
| Detection Coverage Assessment", IEEE 38th Digital Avionics | Detection Coverage Assessment", IEEE/AIAA 38th Digital | |||
| Systems Conference (DACS), pp. 1-10, San Diego, CA, USA , | Avionics Systems Conference (DASC), pp. 1-10, | |||
| September 2019. | DOI 10.1109/DASC43569.2019.9081714, 2019, | |||
| <https://doi.org/10.1109/DASC43569.2019.9081714>. | ||||
| [BAT19] Battista, G., Osechas, O., Narayanan, S., Crespillo, O.G., | [BAT19] Battista, G., Osechas, O., Narayanan, S., Crespillo, O.G., | |||
| Gerbeth, D., Maeurer, N., Mielke, D., and T. Graeupl, | Gerbeth, D., Maeurer, N., Mielke, D., and T. Graeupl, | |||
| "Real-Time Demonstration of Integrated Communication and | "Real-Time Demonstration of Integrated Communication and | |||
| Navigation Services Using LDACS", IEEE Integrated | Navigation Services Using LDACS", Integrated | |||
| Communications, Navigation and Surveillance Conference | Communications, Navigation and Surveillance Conference | |||
| (ICNS), pp. 1-12, Herndon, VA, USA , 2019. | (ICNS), pp. i-xii, DOI 10.1109/ICNSURV.2019.8735195, 2019, | |||
| <https://elib.dlr.de/134475/1/08735195.pdf>. | ||||
| [BRA06] Brandes, S., Schnell, M., Rokitansky, C.H., Ehammer, M., | [BRA06] Brandes, S., Schnell, M., Rokitansky, C.-h., Ehammer, M., | |||
| Graeupl, T., Steendam, H., Guenach, M., Rihacek, C., and | Graeupl, T., Steendam, H., Guenach, M., Rihacek, C., and | |||
| B. Haindl, "B-VHF -Selected Simulation Results and Final | B. Haindl, "B-VHF - Selected Simulation Results and Final | |||
| Assessment", IEEE 25th Digital Avionics Systems Conference | Assessment", IEEE 25th Digital Avionics Systems Conference | |||
| (DACS), pp. 1-12, New York, NY, USA , September 2019. | (DACS), pp. 1-12, DOI 10.1109/DASC.2006.313670, 2006, | |||
| <https://doi.org/10.1109/DASC.2006.313670>. | ||||
| [SCH08] Schnell, M., Brandes, S., Gligorevic, S., Rokitansky, | [SCH08] Schnell, M., Brandes, S., Gligorevic, S., Rokitansky, C.- | |||
| C.H., Ehammer, M., Graeupl, T., Rihacek, C., and M. | H., Ehammer, M., Graeupl, T., Rihacek, C., and M. | |||
| Sajatovic, "B-AMC - Broadband Aeronautical Multi-carrier | Sajatovic, "B-AMC - Broadband Aeronautical Multi-carrier | |||
| Communications", IEEE 8th Integrated Communications, | Communications", 2008 Integrated Communications, | |||
| Navigation and Surveillance Conference (ICNS), pp. 1-13, | Navigation and Surveillance Conference, pp. 1-12, | |||
| New York, NY, USA , April 2008. | DOI 10.1109/ICNSURV.2008.4559173, 2008, | |||
| <https://doi.org/10.1109/ICNSURV.2008.4559173>. | ||||
| [SCH19] Schnell, M., "DLR tests digital communications | [SCH19] German Aerospace Center (DLR), "DLR tests digital | |||
| technologies combined with additional navigation functions | communications technologies combined with additional | |||
| for the first time", 3 March 2019, | navigation functions for the first time", 27 March 2019, | |||
| <https://www.dlr.de/dlr/en/desktopdefault.aspx/tabid- | <https://www.dlr.de/en/latest/ | |||
| 10081/151_read-32951/#/gallery/33877>. | news/2019/01/20190327_modern-technology-for-the-flight- | |||
| deck>. | ||||
| [HAI09] Haindl, B., Rihacek, C., Sajatovic, M., Phillips, B., | [HAI09] Haindl, B., Rihacek, C., Sajatovic, M., Phillips, B., | |||
| Budinger, J., Schnell, M., Kamiano, D., and W. Wilson, | Budinger, J., Schnell, M., Kamiano, D., and W. Wilson, | |||
| "Improvement of L-DACS1 Design by Combining B-AMC with P34 | "Improvement of L-DACS1 Design by Combining B-AMC with P34 | |||
| and WiMAX Technologies", IEEE 9th Integrated | and WiMAX Technologies", 2009 Integrated Communications, | |||
| Communications, Navigation and Surveillance Conference | Navigation and Surveillance Conference, pp. 1-8, | |||
| (ICNS), pp. 1-8, New York, NY, USA , May 2009. | DOI 10.1109/ICNSURV.2009.5172873, May 2009, | |||
| <https://doi.org/10.1109/ICNSURV.2009.5172873>. | ||||
| [EHA11] Ehammer, M. and T. Graeupl, "AeroMACS - An Airport | [EHA11] Ehammer, M., Pschernig, E., and T. Graeupl, "AeroMACS - An | |||
| Communications System", IEEE 30th Digital Avionics Systems | Airport Communications System", 2011 IEEE/AIAA 30th | |||
| Conference (DACS), pp. 1-16, New York, NY, USA , September | Digital Avionics Systems Conference, pp. 4C1-1-4C1-16, | |||
| 2011. | DOI 10.1109/DASC.2011.6095903, 2011, | |||
| <https://doi.org/10.1109/DASC.2011.6095903>. | ||||
| [SCH14] Schnell, M., Epple, U., Shutin, D., and N. | [SCH14] Schnell, M., Epple, U., Shutin, D., and N. | |||
| Schneckenburger, "LDACS: Future Aeronautical | Schneckenburger, "LDACS: Future Aeronautical | |||
| Communications for Air- Traffic Management", IEEE | Communications for Air- Traffic Management", IEEE | |||
| Communications Magazine, 52(5), 104-110 , 2017. | Communications Magazine, vol. 52, no. 5, pp. 104-110, | |||
| DOI 10.1109/MCOM.2014.6815900, May 2014, | ||||
| <https://doi.org/10.1109/MCOM.2014.6815900>. | ||||
| [Cavalcanti1287] | [Cavalcanti1287] | |||
| Cavalcanti, D., Venkatesan, G., Cariou, L., and C. | Cavalcanti, D., Venkatesan, G., Cariou, L., and C. | |||
| Cordeiro, "TSN support in 802.11 and potential extensions | Cordeiro, "TSN support in 802.11 and potential extensions | |||
| for TGbe", 2019, | for TGbe", 10 September 2019, | |||
| <https://mentor.ieee.org/802.11/dcn/19/11-19-1287>. | <https://mentor.ieee.org/802.11/dcn/19/11-19-1287>. | |||
| [Sudhakaran2021] | [Sudhakaran2021] | |||
| Sudhakaran, S., Montgomery, K., Kashef, M., Cavalcanti, | Sudhakaran, S., Montgomery, K., Kashef, M., Cavalcanti, | |||
| D., and R. Candell, "Wireless Time Sensitive Networking | D., and R. Candell, "Wireless Time Sensitive Networking | |||
| for Industrial Collaborative Robotic Workcells", 17th IEEE | for Industrial Collaborative Robotic Workcells", 2021 17th | |||
| International Conference on Factory Communication Systems | IEEE International Conference on Factory Communication | |||
| (WFCS) , 2021, | Systems (WFCS), pp. 91-94, | |||
| DOI 10.1109/WFCS46889.2021.9483447, 2021, | ||||
| <https://ieeexplore.ieee.org/abstract/document/9483447>. | <https://ieeexplore.ieee.org/abstract/document/9483447>. | |||
| [Fang_2021] | [Fang_2021] | |||
| Fang, J., Cavalcanti, D., Cordeiro, C., and C. Cheng, | Fang, J., Sudhakaran, S., Cavalcanti, D., Cordeiro, C., | |||
| "Wireless TSN with Multi-Radio Wi-Fi", IEEE International | and C. Chen, "Wireless TSN with Multi-Radio Wi-Fi", 2021 | |||
| Conference on Standards for Communications and Networking, | IEEE Conference on Standards for Communications and | |||
| December 2021. , 2021. | Networking (CSCN), pp. 105-110, | |||
| DOI 10.1109/CSCN53733.2021.9686180, 2021, | ||||
| <https://doi.org/10.1109/CSCN53733.2021.9686180>. | ||||
| Acknowledgments | ||||
| Many thanks to the participants of the RAW WG, where a lot of the | ||||
| work discussed in this document happened, and to Malcolm Smith for | ||||
| his review of the section on IEEE 802.11. Special thanks for post | ||||
| directorate and IESG reviewers Roman Danyliw, Victoria Pritchard, | ||||
| Donald Eastlake, Mohamed Boucadair, Jiankang Yao, Shivan Kaul Sahib, | ||||
| Mallory Knodel, Ron Bonica, Ketan Talaulikar, Éric Vyncke, and Carlos | ||||
| J. Bernardos. | ||||
| Contributors | ||||
| This document aggregates articles from authors specialized in each | ||||
| technology. Beyond the main authors listed on the front page, the | ||||
| following contributors proposed additional text and refinements that | ||||
| improved the document. | ||||
| * Georgios Z. Papadopoulos contributed to the TSCH section. | ||||
| * Nils Maeurer and Thomas Graeupl contributed to the LDACS section. | ||||
| * Torsten Dudda, Alexey Shapin, and Sara Sandberg contributed to the | ||||
| 5G section. | ||||
| * Rocco Di Taranto contributed to the Wi-Fi section. | ||||
| * Rute Sofia contributed to the Introduction and Terminology | ||||
| sections. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Pascal Thubert (editor) | Pascal Thubert (editor) | |||
| 06330 Roquefort-les-Pins | 06330 Roquefort-les-Pins | |||
| France | France | |||
| Email: pascal.thubert@gmail.com | Email: pascal.thubert@gmail.com | |||
| Dave Cavalcanti | Dave Cavalcanti | |||
| Intel Corporation | Intel Corporation | |||
| 2111 NE 25th Ave | 2111 NE 25th Ave | |||
| Hillsboro, OR, 97124 | Hillsboro, OR 97124 | |||
| United States of America | United States of America | |||
| Phone: 503 712 5566 | Phone: 503 712 5566 | |||
| Email: dave.cavalcanti@intel.com | Email: dave.cavalcanti@intel.com | |||
| Xavier Vilajosana | Xavier Vilajosana | |||
| Universitat Oberta de Catalunya | Universitat Oberta de Catalunya | |||
| 156 Rambla Poblenou | 156 Rambla Poblenou | |||
| 08018 Barcelona Catalonia | 08018 Barcelona Catalonia | |||
| Spain | Spain | |||
| Email: xvilajosana@uoc.edu | Email: xvilajosana@uoc.edu | |||
| End of changes. 422 change blocks. | ||||
| 1306 lines changed or deleted | 1424 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||