<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tvr-applicability-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-applicability-00"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="14"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 56?>

<t>Time-Variant Routing (TVR) is a routing system that can accommodate predicted topology changes caused by internal or
external factors. Typical use cases include resource preservation networks, operating efficiency networks and dynamic
reachability networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Time-Variant Routing Working Group mailing list (tvr@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tvr/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/zhangli-abcd/TVR-Applicability-2"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a need in network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility. It is also essential in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedules, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities. The examples assume YANG instance data encoding per <xref target="RFC7951"/> for JSON and the TVR schedule YANG modules.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the following terms:</t>
      <dl>
        <dt>Managing Device:</dt>
        <dd>
          <t>A centralized entity responsible for generating
and maintaining TVR schedules.  The managing device distributes
schedules to network controllers and/or managed devices using the
TVR YANG modules.  In some deployments, the managing device may
also serve as the network controller.</t>
        </dd>
        <dt>Network Controller:</dt>
        <dd>
          <t>An entity that receives topology schedules
from the managing device and performs route computation based on
time-variant network conditions.  The controller then distributes
routing results to managed devices.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Managed Device: A network device (e.g., router, switch) that
receives schedules and/or routing instructions, and executes them
according to the specified time windows.  Managed devices may
receive schedules directly from the managing device or routing
results from the network controller.</t>
        </li>
      </ul>
    </section>
    <section anchor="applicability-of-the-tvr-yang-model">
      <name>Applicability of the TVR YANG Model</name>
      <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> defines the TVR node YANG module and TVR topology YANG module. This
clause discusses the applicability of these two modules separately.</t>
      <section anchor="applicability-node-yang">
        <name>Applicability of TVR Node YANG Module</name>
        <t>As specified in <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-node.yang is a device model and designed to manage a
single node with scheduled attributes. It is not necessary in all TVR use cases.</t>
        <t>The applicability of TVR node YANG module depends on whether changes in the attributes of network devices are caused by
the environment or centrally controlled.</t>
        <ul spacing="normal">
          <li>
            <t>When the changes are caused by the environment changes (such as movement, sunlight changes, and weather changes) or
by decisions made by the devices themselves, the network device does not need to get the managed information through the YANG module. For example,
when the distance between two nodes' is too far to establish a connection, then the link is down. Another case is that when the weather is
not good and leading to the link degradation, then the nodes decide to disconnect the link.</t>
          </li>
          <li>
            <t>When the changes are caused by the centralized control (such as a controller, or an orchestrator), the devices themselves
do not know when to adjust the attributes. In this case, the scheduled attributes changes should be delivered to the
network devices through TVR node YANG module.</t>
          </li>
        </ul>
      </section>
      <section anchor="applicability-topology-yang">
        <name>Applicability of TVR Topology YANG Module</name>
        <t>As specified in <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-topology.yang describes a network topology
with a time-variant availability schedule. This YANG module is also not applicable for all TVR use cases.</t>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <ul spacing="normal">
          <li>
            <t>When the schedules are generated and executed in distributed manner, which means that each node generates and executes its specific
schedules. In this scenario, the topology YANG module is not necessary, the devices can collect topology schedules by other means.
This scenario is outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner and within the same device, the topology YANG module is also not applicable.
Therefore, this scenario is also outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner but on different devices. For example, the schedule is
generated by the managing device, and executed by the network controller. In this scenario the scheduled topology changes
need to be sent to the execution device through the topology YANG module. This scenario is called "Centralized Scenario".</t>
          </li>
          <li>
            <t>When the schedules are generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the scheduled topology changes to the managed device. This scenario is called "Distributed Scenario".</t>
          </li>
        </ul>
        <t>To summarize the key differences between these scenarios:</t>
        <ul spacing="normal">
          <li>
            <t>Centralized Scenario: Schedules are generated by the managing
device, stored in the network controller, and executed by network
devices.  Route computation runs in the controller, and routing
results are pushed to the network devices.</t>
          </li>
          <li>
            <t>Distributed Scenario: Schedules are generated by the managing
device, stored in and executed by the network devices.  Route
computation runs in the network devices themselves.</t>
          </li>
        </ul>
        <section anchor="centralized-scenario">
          <name>Interactions in Centralized Scenario</name>
          <t>In the centralized scenario, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized scenario.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Scenario</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
Topology YANG Module                        Node YANG Module(optional)
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
          <t>A centralized scenario involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device may need to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>. This is optional and only necessary when the node attribute changes
are instructed by the controller. Meanwhile, the network devices need to report their own status data to the managing device.</t>
          <t>The managing device needs to deliver the schedules of network topology to the network controller by the TVR Network
Topology YANG module <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation results to the network devices. The format of the routing
results depend on the protocols deployed (BGP, PCEP, etc.). Routing results <bcp14>MAY</bcp14> be delivered ahead and activated using an explicit time reference (e.g., absolute UTC), or via pre-staging plus an activation trigger.</t>
        </section>
        <section anchor="distributed-scenario">
          <name>Interactions in Distributed Scenario</name>
          <t>In the distributed scenario, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Scenario</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
               Topology YANG Module and
               Node YANG Module(optional)
                          |
 +-----------------------\|/-----------------------+
 |         Managed Devices (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
          <t>The distributed model only involves the interaction between managing devices and network devices(managed devices).</t>
          <t>The managing device need to deliver network topology schedules to all the network devices by TVR Network Topology YANG
module for route calculation. The managing device may also need to deliver node-specific schedules to network devices by
TVR Schedule Node YANG module, this is optional and only necessary when the node attributes changes are instructed by
the controller. The network devices need to report their own status data to the managing device.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The "ietf-tvr-schedule" module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The "ietf-tvr-topology" module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The "ietf-tvr-node" module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>'node-schedule'</t>
          </li>
          <li>
            <t>'interface-schedule'</t>
          </li>
          <li>
            <t>'attribute-schedule'</t>
          </li>
        </ul>
        <t>When using these YANG modules with NETCONF or RESTCONF, implementations <bcp14>SHOULD</bcp14> target the intended configuration datastore
for schedule provisioning and <bcp14>MAY</bcp14> read from the operational datastore
to retrieve execution status and applied schedules.  Clients can use
NMDA (Network Management Datastore Architecture, <xref target="RFC8342"/>)
operations to distinguish between intended configuration and actual
operational state.  For example, the managing device writes schedules
to the intended or running datastore, and network devices report
execution status via the operational datastore.</t>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in 'schedule-id', and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
More detailed examples of the JSON example is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "start-time-utc":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedules are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/>, RESTCONF
<xref target="RFC8040"/> and CORECONF<xref target="I-D.ietf-core-comi-19"/>. This section discusses the applicability of these protocols for
configuring time-variant network resources using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>CORECONF provides a lightweight, stateless method for managing small network devices where saving bytes to transport a
message is very important. CORECONF uses CoAP<xref target="RFC7252"/> methods to access structured data defined in YANG which is a complementary to RESTCONF.
Unlike RESTCONF, many CORECONF design decisions are motivated by minimizing the message size. Therefore, CORECONF is advantageous
in networks with constrained devices and very limited transmission bandwidth, especially in IoT devices that already deployed CoAP.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. CORECONF is preferred
in resource constrained IoT networks where saving message bytes is a priority. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of these management protocols, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>Time Synchronization is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
      <t>Time Synchronization mechanisms will be used to ensure:</t>
      <ul spacing="normal">
        <li>
          <t>Coordination of Planned Network Events;</t>
        </li>
        <li>
          <t>Verification of TVR Data Model Time Stamps</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths;</t>
        </li>
        <li>
          <t>Fault Tolerance.</t>
        </li>
      </ul>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough. However, for the dynamic reachability scenarios, a fine-granularity time synchronization may
be necessary, as the nodes may moving very fast in some cases (the moving speed of a low earth orbit satellite is more than 7900 m/s)</t>
      <t>Operators <bcp14>SHOULD</bcp14> derive a maximum acceptable time-error bound based on the schedule granularity, execution jitter tolerance, and
activation window requirements.  For instance, if a schedule has a 1-second activation window and the system can tolerate up to 100ms of
execution jitter, the time synchronization error <bcp14>MUST</bcp14> be kept well below 900ms.  The chosen time synchronization protocol and
configuration <bcp14>MUST</bcp14> be capable of meeting this derived bound under all expected network conditions.</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.</t>
      <t>Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Satellite Based Timing Service (SBTS)
and Precision Time Protocol (PTP). The SBTS includes but not limited to Global Position System (GPS),
BeiDou Navigation Satellite System(BDS), Global Navigation Satellite System(GLONASS), and Galileo satellite navigation system.
Software-based protocols, on the other hand, synchronize clocks through software packages running on systems, such as Network
Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>The security aspects of time synchronization mechanisms are discussed further in <xref target="security-considerations"/> of this document.</t>
      <section anchor="hardware-based-time-synchronization-mechanisms">
        <name>Hardware-based Time Synchronization Mechanisms</name>
        <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated hardware. SBTS and PTP are the typical hardware-based time synchronization mechanisms.</t>
        <t>SBTS provides a precise time synchronization service based on the signals transmitted by the satellites. SBTS can realize the micro-second level time synchronization among the devices installed with SBTS reviver hardware.</t>
        <t>PTP is a network protocol that complies with the IEEE 1588 standard and is used to implement high-precision time synchronization between network nodes. PTP implements time synchronization by transmitting synchronization messages between master and slave devices. Based on the hardware timestamp, the precision of time synchronization is much higher than that of NTP, and can reach the sub-microsecond level or even tens of nanoseconds.  When deploying PTP in TVR networks, the managing devices should be the master and the network devices and controller should be the slaves which get time from the master.</t>
        <t>Both SBTS and PTP can realize micro-second level time synchronization. Depending on the features of TVR network, the SBTS would be the preferred mechanisms for
large-scale, high dynamic and open-air networks, especially networks with unreliable links as it does not require network links to exchange time information.
For the small-scale networks with stable links but have high-precision time synchronization requirements, the PTP is much preferred.</t>
      </section>
      <section anchor="software-based-time-synchronization-protocols">
        <name>Software-based Time Synchronization Protocols</name>
        <t>Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).</t>
        <section anchor="ntp">
          <name>NTP</name>
          <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
          <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
          <figure anchor="ref-to-fig3">
            <name>Deployment Case of NTP in Tidal Networks</name>
            <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
          </figure>
          <t>NTP is preferred in large-scale networks with reliable links and long-term changes, which does not require a high-precision time synchronization.</t>
        </section>
        <section anchor="sntp">
          <name>SNTP</name>
          <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and has lower clock precision, but the synchronization precision still can be kept within
seconds. SNTP is also preferred in large-scale networks with reliable links, long-term changes, and loose synchronization precision. In addition, it is more suitable for networks with limited resources than NTP.</t>
        </section>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The source of the schedule database may be created from multiple sources, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>Detailed schedule distribution mechanisms beyond YANG-based configuration are outside of this document.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedules and interface schedules. The Topology YANG module includes node schedules and link schedules.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Link schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedules.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedules capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <t>Since the all the schedules are generated by the managing devices, it is necessary to make sure that the managing
device and managed devices within a schedule domain (<xref section="2.1.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>) are synchronized
with the same time source. It ensures they have the same notion of when that is.</t>
      <section anchor="schedule-dissemination">
        <name>Schedule Dissemination</name>
        <t>When distributing schedules, the following problems should be considered:</t>
        <ul spacing="normal">
          <li>
            <t>The managed devices that receives a schedule should have the ability to execute the schedule. If the device does not support schedule
execution, it <bcp14>SHOULD</bcp14> reject the update with an appropriate error, or ignore it if the management interface does not support error reporting.</t>
          </li>
          <li>
            <t>The distributing of a schedule <bcp14>SHOULD</bcp14> be delivered at least x (operator-defined) time before the earliest start time of the schedule, this ensures that the
managed device has enough time to execute this schedule.</t>
          </li>
        </ul>
      </section>
      <section anchor="schedule-execution">
        <name>Schedule Execution</name>
        <t>Schedule execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. The schedule execution of Node Module and Topology Module should be considered separately.</t>
        <section anchor="execution-of-node-schedule">
          <name>Execution of Node Schedule</name>
          <t>Node schedule execution indicates a node to change its node/interfaces availability/power up
and down, and other attributes directly or by commands.</t>
          <t>when executing a node schedule, the schedule executor should undertake an action at specified time points as indicated in the schedule.</t>
        </section>
        <section anchor="execution-of-topology-module-schedule">
          <name>Execution of Topology Module Schedule</name>
          <t>Topology schedule execution means a node take some measures before or upon the scheduled topology changes.</t>
          <t>The schedule executor should understand the consequences of the schedule execution. The addition and deletion of the topology
need to be considered separately.</t>
          <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all the topology changes are
confirmed to be operational. Pre-computation <bcp14>MAY</bcp14> be used, operators should weigh compute cost versus reduced activation latency. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
          <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
          <t>In addition to the addition and deletion of topology, a schedule may indicate the attributes change of some links, such as bandwidth and delay.
If an attribute changes better (such as latency decrease and bandwidth increase), then the executor should take actions later
or until the topology change is proven to be fully operational.
If an attribute changes worse (such as latency increase and bandwidth decrease), then the node should react to it before the change take place.</t>
        </section>
      </section>
      <section anchor="schedule-recovery">
        <name>Schedule Recovery</name>
        <t>Schedule recovery means when a node lost its specific schedule data, it should be able to recover these schedule data.
Typical scenarios include data loss due to device restart, disconnection from managing devices and failure to receive new
schedules for a long time. In these scenarios, once the connection between the managed device and the managing device is
established again, the managing device needs to re-distribute all schedules that start time is later than the current moment
to the managed device after time synchronization is finished.</t>
      </section>
      <section anchor="error-handling">
        <name>Error Handling</name>
        <section anchor="consistency-error">
          <name>Consistency Error</name>
          <t>Consistency error means that some time parameters conflict with other time parameters in the same schedule or in other schedules.</t>
          <ul spacing="normal">
            <li>
              <t>If the time parameters of a schedule conflict with each other, for example, the period-start later than period-end,
the duration is longer than the product of frequency and interval, or the duration is longer than utc-until, then the schedule
should be discarded and an error should be returned to the schedule originator (e.g., the managing device or management client).</t>
            </li>
            <li>
              <t>If there is a conflict between schedules with different schedule IDs, for example, schedule1 indicates that interface B is closed at time A, but
schedule2 indicates that interface B is open at time A, then only the conflicting update should be rejected (retaining the last-known-good schedule).
An error should be returned to the schedule originator, and the conflict <bcp14>MUST</bcp14> be
logged for audit purposes.
If two schedules have the same schedule ID, then it is considered as an update of the former schedule. Updates with the same schedule ID <bcp14>SHALL</bcp14> completely replace the previous schedule (full replacement, not merge).
Implementations <bcp14>SHOULD</bcp14> support versioning or etag-based mechanisms to detect concurrent updates.
Partial updates to a schedule are NOT permitted; clients <bcp14>MUST</bcp14> send the complete schedule definition.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments.</t>
      <section anchor="dos-attack">
        <name>Denial-of-Service (DoS) Attack</name>
        <t>In a time-variant network, malicious actors could attack the network by disrupting or manipulating the time synchronization
process. For example, an attacker could intentionally delay or corrupt time signals exchanged within the network, leading
to routing errors and widespread denial-of-service (DoS) attacks.</t>
        <t>This kind of attack could be mitigated by the redundant time synchronization mechanisms, for example, multiple NTP sources
or multiple time synchronization protocols could be deployed in a TVR network. The network devices could guarantee the
correctness of the time by checking whether the time signals from different sources or protocols.</t>
        <t>In addition, peer authentication is also an important way to protect the time signals being tampered by
attackers. Some security extensions for time synchronization protocols (such as NTS (Network Time Security)) are
recommended to be applied.</t>
      </section>
      <section anchor="traffic-analysis">
        <name>Traffic Analysis and Path Prediction</name>
        <t>In a time-variant network, if time information is not adequately protected, attackers could conduct traffic analysis to
infer routing decisions, network load, or usage patterns. The schedule ability could enable attackers to launch highly
targeted attacks, such as selectively overloading certain links or intercepting sensitive communications.</t>
        <t>This kind of attack could be mitigated by the encryption of schedules and the authentication of managing devices. For
the networks using NETCONF to deliver schedules, NETCONF over TLS<xref target="RFC7589"/> is recommended to achieve the bidirectional
authentication and encryption of YANG model data. RESTCONF supports TLS originally, so it can be deployed without
additional configurations or modifications.</t>
        <t>In addition, in time variant networks with centralized scenario<xref target="centralized-scenario"/>, the encryption of routing path
information is also necessary to avoid the fake routing information. Considering the most typical protocols used to
deliver the routing path information between controller and network devices are BGP and PCEP, and both are based on TCP.
Therefore, the TLS is <bcp14>RECOMMENDED</bcp14> to provide confidentiality and integrity protection.</t>
      </section>
      <section anchor="activity-identification">
        <name>Activity Identification and Privacy</name>
        <t>In certain scenarios, precise time information exchanged within the network could be correlated with specific user or
device behavior, inadvertently revealing private information.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="traffic-analysis"/>.</t>
      </section>
      <section anchor="spoofing-and-manipulation-of-time-information">
        <name>Spoofing and Manipulation of Time Information</name>
        <t>In a time-variant network, if an attacker were to inject false or manipulated time data into the network, it could cause
routers and devices to make incorrect decisions, potentially leading to traffic misrouting, network partitions, or
inefficient use of resources.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="replay-attacks-on-time-sensitive-data">
        <name>Replay Attacks on Time-Sensitive Data</name>
        <t>Time-variant network data and schedules updates may be susceptible to replay attacks, which could cause network devices
to act on outdated information, leading to inconsistent routing decisions, misaligned schedules, or security gaps. In
particular, attackers could exploit replay attacks to force devices into outdated configurations or interfere with the
synchronization of schedules across the network.</t>
        <t>This kind of attack could be mitigated by encrypting time signals, schedules and routing path data, and adding a unique
number to the encrypted section of a packet. This has been implemented in existing protocols, for example, the NTS
supports unique identifier extension field (EF) containing a random number, the TLS supports Message Authentication Code
generated from sequence number.</t>
      </section>
      <section anchor="compromised-time-sources">
        <name>Compromised Time Sources</name>
        <t>The reliance on external time sources for synchronization purposes presents a potential attack surface for time-variant
networks. If a trusted time source, such as a GPS signal or an NTP server, is compromised, the attacker could feed
erroneous time information to the entire network, disrupting its operation.</t>
        <t>This kind of attack could be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="schedule-tampering-and-malicious-schedule-injection">
        <name>Schedule Tampering and Malicious Schedule Injection</name>
        <t>Unauthorized modification or injection of malicious TVR schedules
poses significant operational and security risks.  An attacker who
successfully tampers with schedules could cause traffic blackholing
(by scheduling link or node shutdowns at critical times), trigger
costly network-wide reroutes, degrade service-level agreement (SLA)
performance, or enable targeted interception of sensitive traffic
flows.  Such attacks undermine the predictability and reliability
that TVR aims to provide.</t>
        <t>Mitigating schedule tampering requires a defense-in-depth approach:</t>
        <ul spacing="normal">
          <li>
            <t>Authentication and Authorization: All schedule updates <bcp14>MUST</bcp14> be
authenticated to verify the identity of the originator.  Role
based access control (RBAC) or attribute-based access control
(ABAC) <bcp14>SHOULD</bcp14> be enforced to ensure that only authorized entities
can modify schedules.</t>
          </li>
          <li>
            <t>Integrity Protection: Schedules <bcp14>MUST</bcp14> be protected against
tampering in transit and at rest using cryptographic integrity
mechanisms (e.g., digital signatures, HMAC).  NETCONF over TLS
<xref target="RFC7589"/>, RESTCONF over TLS, and similar secure transport
protocols provide such protection.</t>
          </li>
          <li>
            <t>Audit Logging: All schedule creation, modification, and deletion
operations <bcp14>SHOULD</bcp14> be logged with timestamps, originator identity,
and a description of the change.  These logs are essential for
forensic analysis and detecting anomalous behavior.</t>
          </li>
          <li>
            <t>Rate Limiting and Anomaly Detection: Implementations <bcp14>SHOULD</bcp14>
enforce rate limits on schedule update operations and deploy
anomaly detection mechanisms to identify suspicious patterns
(e.g., rapid schedule churn, schedules from unexpected sources).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="9" month="February" year="2026"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-08"/>
        </reference>
        <reference anchor="RFC9657">
          <front>
            <title>Time-Variant Routing (TVR) Use Cases</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="N. Kuhn" initials="N." surname="Kuhn"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document introduces use cases where Time-Variant Routing (TVR) computations (i.e., routing computations that take into consideration time-based or scheduled changes to a network) could improve routing protocol convergence and/or network performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9657"/>
          <seriesInfo name="DOI" value="10.17487/RFC9657"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>Time-Variant Routing (TVR) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route.

   This document introduces requirements for the design and
   implementation of systems which perform TVR computations.  It also
   explains different aspects of a TVR system which need to be
   considered during its design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-08"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   This document defines common types and groupings that are meant to be
   used for scheduling purposes such as event, policy, services, or
   resources based on date and time.  For the sake of better modularity,
   the YANG module includes a set of recurrence-related groupings with
   varying levels of representation (i.e., from basic to advanced) to
   accommodate a variety of requirements.  It also defines groupings for
   validating requested schedules and reporting scheduling status.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-10"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="I-D.ietf-core-comi-19">
          <front>
            <title>CoAP Management Interface (CORECONF)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>consultant</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-19"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages. This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="I-D.lj-rtg-sat-routing-consideration">
          <front>
            <title>Routing in Satellite Networks: Challenges &amp; Considerations</title>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Tianji Jiang" initials="T." surname="Jiang">
              <organization>China Mobile</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   The SDO 3GPP has done tremendous work to either standardize or study
   various types of wireless services that would depend on the satellite
   constellation network.  While the ISLs, or Inter-Satellite Links,
   along with the routing scheme(s) over them are critical to help
   fullfil the satellite services, the 3GPP considers them out-of-scope.
   This leaves the significant work to be explored in the IETF domain.
   This draft stems from the 3GPP satellite use cases that have been
   studied for many years up to now, across a couple of releases, and
   lands on summarizing the challenges &amp; considerations of the
   satellite-based routing.  Based on some unique &amp; advantageous
   characteristics associated with satellite networks, the draft raises
   briefly the general routing considerations for the integrated Non-
   Terrestrial &amp; Terrestial Networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lj-rtg-sat-routing-consideration-00"/>
        </reference>
      </references>
    </references>
    <?line 696?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <t>All examples in this appendix are intended as <xref target="RFC7951"/> JSON instance data, following the YANG instance data encoding rules for JSON.  The duration field values are expressed in seconds unless otherwise noted.</t>
      <section numbered="false" anchor="code-examples-for-energy-harvesting-wireless-sensor-network">
        <name>Code Examples for "Energy-harvesting Wireless Sensor Network"</name>
        <t>As described in <xref section="2.3" sectionFormat="of" target="RFC9657"/>, in an energy-harvesting wireless sensor network, nodes rely exclusively on
environmental sources for power, such as solar panels. On-board power levels may fluctuate based on various factors.
This example assumes that a node will only power its radio when available power is over some threshold.
In this scenario, the TVR Node YANG Module is not applicable, since the node attributes changes are caused by the environment,
not by the instructions from managing device. The TVR Topology YANG Module may be necessary to convey the schedule of topology
changes to all the nodes.</t>
        <t>Considering a topology with three nodes, the connectivity of this three-node networks changes over time and repeats daily.
The detailed change information is shown in <xref target="ex-inf1"/>. The link between node1 and node2 is powered on at 8:00 and powered off at 11:00.
The link between node2 and node3 is powered on at 11:00 and powered off at 16:00.</t>
        <figure anchor="ex-inf1">
          <name>An example of topology connectivity of Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
      +----------+        +----------+        +----------+
8:00  |  Node 1  |--------|  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
11:00 |  Node 1  |        |  Node 2  |--------|  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
16:00 |  Node 1  |        |  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+
]]></artwork>
        </figure>
        <t>The corresponding JSON example is shown in <xref target="ex-inf2"/>.</t>
        <figure anchor="ex-inf2">
          <name>JSON example of topology schedule for Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 1,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 2,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 3,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 4,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-cellular-network">
        <name>Code Examples for "Cellular Network"</name>
        <t>As described in <xref section="3.3" sectionFormat="of" target="RFC9657"/>, the "Cellular Network" is a network where the nodes operating over cellular
connections that charge both peak and off-peak data rates. In this case, individual nodes may be allocated a fixed set of
"peak" minutes such that exceeding that amount of time results in expensive overage charges. As a result, links are just
available at specific "peak" minutes.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
interfaces and deliver the predicted topology changes to each node.</t>
        <t>Considering a topology with three nodes, the connectivity variation of it is shown in <xref target="ex-inf1"/>. Taking the node1 as an
example, the corresponding node YANG module JSON example for node1 is shown in <xref target="ex-inf3"/></t>
        <figure anchor="ex-inf3">
          <name>TVR node YANG module JSON example of node1</name>
          <artwork align="center"><![CDATA[
 {
     "ietf-tvr-node:node-schedule": {
         "node-id": "192.168.0.1",
         "node-power-schedule": {
             "power-default": true,
             "schedules": []
         },
         "interface-schedule": {
             "interface": [
                 {
                     "name": "interface1",
                     "default-available": false,
                     "schedules": [
                         {
                             "schedule-id": 100,
                             "recurrence-first": {
                                 "start-time-utc": "2026-01-01T08:00:00Z",
                                 "duration": 10800
                             },
                             "utc-until": "2027-01-01T00:00:00Z",
                             "frequency": "ietf-schedule:daily",
                             "attr-value": {
                                 "available": true
                             }
                         }
                     ]
                 }
             ]
         }
     }
 }
]]></artwork>
        </figure>
        <t>The corresponding topology yang module JSON example is the same as <xref target="ex-inf2"/></t>
      </section>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for "Tidal Network"</name>
        <t>As described in <xref section="3.4" sectionFormat="of" target="RFC9657"/>, the "Tidal Network" is a network where traffic volume undergoes significant
fluctuations at different times. In the context of a tidal network scenario, energy-saving methods may include the deactivation
of some or all components of network nodes as planned.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
(interfaces) and deliver the predicted topology changes to each node. <xref target="ex-inf4"/> shows a tidal network topology with 4
nodes.</t>
        <figure anchor="ex-inf4">
          <name>An example topology of Tidal Network</name>
          <artwork align="center"><![CDATA[
    +----+                  +----+               +----+                    +----+
    | N1 |--------L1--------| N2 |               | N1 |---------L1---------| N2 |
    +----+                  +----+               +----+                    +----+
       |  \                /  |                     |                        |
       |    \            /    |                     |                        |
       |      \        /      |                     |                        |
       |        L6    L5      |                     |                        |
      L2          \/         L3                    L2                       L3
       |         /  \         |                     |                        |
       |       /      \       |                     |                        |
       |     /          \     |                     |                        |
       |   /              \   |                     |                        |
    +----+                  +----+               +----+                     +----+
    | N3 |--------L4--------| N4 |               | N3 |---------L4----------| N4 |
    +----+                  +----+               +----+                     +----+
Topology1 (8:00-23:00 everyday)     Topology 2(23:00-23:59 and 00:00-08:00 everyday)
]]></artwork>
        </figure>
        <t>Taking the node N1 as an example, assuming the node-ids of N1, N2, N3, N4 are 192.168.0.1, 192.168.0.2, 192.168.0.3,
and 192.168.0.4. The corresponding node YANG module JSON example for it is shown in <xref target="ex-inf5"/></t>
        <figure anchor="ex-inf5">
          <name>TVR node YANG module JSON example of node N1</name>
          <artwork align="center"><![CDATA[
 {
     "ietf-tvr-node:node-schedule": {
         "node-id": "192.168.0.1",
         "node-power-schedule": {
             "power-default": true,
             "schedules": []
         },
         "interface-schedule": {
             "interface": [
                 {
                     "name": "interface2",
                     "default-available": false,
                     "schedules": [
                         {
                             "schedule-id": 100,
                             "recurrence-first": {
                                 "start-time-utc": "2026-01-01T08:00:00Z",
                                 "duration": 54000
                             },
                             "utc-until": "2027-01-01T00:00:00Z",
                             "frequency": "ietf-schedule:daily",
                             "attr-value": {
                                 "available": true
                             }
                         }
                     ]
                 }
             ]
         }
     }
 }
]]></artwork>
        </figure>
        <t>The corresponding topology YANG module JSON example is shown in <xref target="ex-inf6"/></t>
        <figure anchor="ex-inf6">
          <name>JSON example of topology schedule for Tidal Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.4",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 400,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-mobile-satellites">
        <name>Code Examples for "Mobile Satellites"</name>
        <t>As described in <xref section="4.3" sectionFormat="of" target="RFC9657"/>, the "Mobile Satellites" generally refers to the Low Earth Orbit(LEO) network,
which includes hundreds to thousands of spacecrafts that can communicate both with their orbital neighbors as well as
down to any ground station that they happen to be passing over. The connection between the spacecrafts and the ground
station depend on the flight trajectories of the spacecrafts, so the link changes between them is predictable.</t>
        <t><xref section="4.3" sectionFormat="of" target="RFC9657"/> introduces a scenario with 3 spacecrafts and 1 ground station. The changes of topology are
shown in <xref target="ex-inf7"/>. The ground station connects to spacecraft N3 at time t1, connects to N2 at time t2, and connects
to N1 at time t3. The duration of the connection depends on the satellite altitude and the elevation angle.
According to <xref section="2.1" sectionFormat="of" target="I-D.lj-rtg-sat-routing-consideration"/>, for the spacecrafts at the 500km
altitude, and the connection between the spacecraft and ground station can keep for 7 minutes.</t>
        <figure anchor="ex-inf7">
          <name>An example topology for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N3  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N1  |----------|  N2  |----------|  N3  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N1  |----------|  N2  |----------|  N3  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>In this scenario, the TVR topology YANG module is applicable to deliver the predicted topology changes to each node.
However, the TVR node YANG module is not applicable, this depends on whether the link changes are controlled by satellites
themselves or by the managing device. Here, we provide the JSON examples for TVR topology YANG module and node
 YANG module as a reference.</t>
        <t>Taking the spacecraft N1 as an example, assuming the time t1 is 10:00:00 1 July 2025 and the node-ids of N1, N2, N3, and
ground station is 192.168.0.1, 192.168.0.2, 192.168.0.3, and 192.168.0.4.,
then the corresponding node YANG module JSON example for it is shown in <xref target="ex-inf8"/>.</t>
        <figure anchor="ex-inf8">
          <name>TVR node YANG module JSON example of spacecraft N1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                {
                    "name": "satellite2ground-interface",
                    "default-available": false,
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "period-start": "2025-07-01T10:00:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ]
                }
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>Assuming that time t1 is 10:00:00 1 July 2025, time t2 is 10:10:00 1 July 2025, and time t3 is 10:20:00 1 July 2025,
then the corresponding topology YANG module JSON example is shown in <xref target="ex-inf9"/>.</t>
        <figure anchor="ex-inf9">
          <name>JSON example of topology schedule for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.3",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "period-start": "2025-07-01T10:00:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "period-start": "2025-07-01T10:10:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.1",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "period-start": "2025-07-01T10:20:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-predictable-moving-vessels">
        <name>Code examples for "Predictable Moving Vessels"</name>
        <t>As described in <xref section="4.4" sectionFormat="of" target="RFC9657"/>, the "Predictable Moving Vessels" involves the movement of vessels with
predictable trajectories, such as ferries or planes. These endpoints often rely on a combination of satellite and
terrestrial systems for Internet connectivity. Consider a scenario where a vessel uses satellites to access the Internet,
including a ship and three satellites. As the satellite and the vessel move, the vessel establishes connections with the
satellites N1, N2, and N3 at t1, t2, and t3 respectively. It is assumed that each connection lasts for 1 minutes.
The changes of topology are shown in <xref target="ex-inf10"/>.</t>
        <figure anchor="ex-inf10">
          <name>An example topology for Predictable Moving Vessels</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N1  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N3  |----------|  N2  |----------|  N1  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N3  |----------|  N2  |----------|  N1  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>This scenario is similar to the "Mobile Satellites" example, so the TVR node YANG module JSON example and topology YANG
JSON example of this scenario can refer to the JSON example of the "Mobile Satellites" example.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
