You are on page 1of 7

TIME-SENSITIVE NETWORKING STANDARDS

Introduction to Time-Sensitive Networking


Norman Finn

Abstract be sequenced and delivered simultaneously along


multiple paths, with the duplicates deleted at or
A number of companies and standards devel- near their destinations. The curves for this service
opment organizations have, since 2000, been pro- are shown in Fig. 3.
ducing products and standards for “time-sensitive The biggest difference between CBR (Fig. 2)
networks” to support real-time applications that and TSN (Fig. 3) is that the latency and latency
require a) zero packet loss due to buffer conges- variation curves have a larger range, though they
tion, b) extremely low packet loss due to equip- are still bounded. The packet loss curve for TSN
ment failure, and c) guaranteed upper bounds service has a much lower tail than the CBR curve,
on end-to-end latency. Often, a robust capability because TSN uses a different protection scheme
for time synchronization to less than 1 µs is also (discussed later in the section “Packet Replication
required. These networks consist of specially-fea- and Elimination”) than the 1:1 protection usually
tured bridges that are interconnected using stan- employed in CBR.
dard Ethernet links with standard MAC/PHY layers. Some applications are a natural fit with con-
Since 2012, this technology has advanced to the stant bit rate (CBR) service. The original CBR
use of routers, as well as bridges, and features services, telephony and telegraphy, are obvious
of interest to time-sensitive networks have been examples. Some applications are a natural fit with
added to both Ethernet and wireless standards. best-effort packet service. Web browsing is typical
of this usage.
Introduction: Some applications, however, have never been
able to use best-effort service. Examples are indus-
Three Kinds of Packet Service trial control, audio and video production, and
Best effort packet service is familiar to users of automobile control. When these industries moved
routers and bridges. It delivers most packets, most from mechanical or analog technologies to digital
of the time, mostly in order. There are no guaran- technologies in the 1980s, best-effort packet tech-
tees. Performance is statistical. If one plots (Fig. nologies, including Ethernet, were not suitable,
1) the probability density of delivery, end-to-end so these industries had to invent special-purpose
latency, or variation in latency over a given time digital systems. The problem with Ethernet includ-
interval, one sees long, low-probability tails on ed its high cost, compared to special-purpose dig-
every curve.1 ital connections, and its inherent unpredictability.
Constant bit rate (CBR) service is typically Collision detection and retransmission algorithms
offered by time-division multiplexing (TDM) facil- were not suitable for physical control systems.
ities such as synchronous digital hierarchy (SDH) Networking technology is now at the point
or optical transport network (OTN). Latency is where best-effort networking equipment can, at a
fixed, and jitter is essentially zero (Fig. 2). The ser- modest cost, supply TSN services, in addition to its
vice offers connections; every packet flows end- best-effort services, that meet the needs of many
to-end through the connection. The packet loss applications that formerly required either CBR
curve shows that CBR eliminates congestion loss, service or special-purpose digital connections.
so is almost zero if the proper buffering is present. Because of the huge increase in the demand for
If we assume that 1:1 or 1+1 protection is used,2 networking, Ethernet is now cheaper than spe-
packets are lost at a low rate, but in large groups, cial-purpose digital connections, so there is sig-
when an equipment failure is detected and an nificant incentive for these industrial and control
alternate path activated. applications to migrate to Ethernet.
Time-sensitive network (TSN) service, the Table 1 gives an overview of the essential dif-
subject of this article, is another kind of service ferences between CBR, best-effort with typical
that is gaining users and market attention. It is QoS features, and TSN services. These are not
1 End-to-end latency and
based on a best-effort packet network, but the three specific classes of service, but ranges of fea-
latency variation are per network and an application have a contract. This tures supplied by each type of packet service.
packet. Loss probability is contract limits the transmitter of a TSN flow to
highest if few buffers are
allocated, but still finite with
a certain bandwidth (maximum packet size and Essential Features of
maximum packets per time interval). The net-
many buffers allocated.
work, in return, reserves bandwidth, buffering, TSN Networks
2 See IETF RFC6718 for a and scheduling resources for the exclusive use of TSN is a feature supplied by a TSN network that
description of 1:1 and 1+1 these TSN traffic flows. For these flows, the con- is primarily a best-effort packet network consisting
path redundancy in a similar tracts offer bounded latency and zero congestion of bridges (and, in the future, routers or network
context.
loss. In addition, packets belonging to a flow can appliances). The TSN quality of service is supplied
Digital Object Identifier:
10.1109/MCOMSTD.2018.1700076 The author is with the California Institute of Technology.

22 2471-2825/18/$25.00 © 2018 IEEE IEEE Communications Standards Magazine • June 2018


Networking technology is
Loss probability now at the point where
best-effort networking

Probability

Probability
equipment can, at a
modest cost, supply TSN
services, in addition to its
best-effort services, that
Buffers allocated End-to-end latency Latency variation meet the needs of many
Figure 1. Best-effort packet service. applications that formerly
required either CBR ser-
vice or special-purpose
digital connections.
Loss probability

Probability

Probability
Buffers allocated End-to-end latency Latency variation

Figure 2. Constant bit rate packet service.


Loss probability

Probability

Probability

Buffers allocated End-to-end latency Latency variation

Figure 3. TSN packet service.

to “TSN flows” designated as being critical to a ant cause of packet loss is equipment failure.
real-time application. TSN networks can send multiple copies of
The essential features of TSN networks are: sequence-numbered data flows over mul-
1. Time synchronization. All network devices tiple paths, and eliminate the duplicates at
and hosts can synchronize their internal clocks to or near the destinations. There is no cycle
an accuracy between 1 µs and 10 ns. Synchroni- of failure detection and recovery, as every
zation is accomplished using some variant of the packet is duplicated and taken to or near its
IEEE 1588 Precision Time Protocol. destinations, so that one equipment failure
2. Contracts between transmitters and the net- does not cause the loss of even one packet.
work (discussed later in the section “Control and c) Flexibility. New contracts can be made and
Managemen”t): Every TSN flow is the subject of a old ones ended. As TSN flows come and go,
contract arranged between the transmitter of the the proper functioning of all TSN flows is
flow and the network. This enables TSN networks maintained at all times.
to provide: 3. Coexistence with best-effort services.
a) Bounded latency and zero congestion loss. Unless the demands of the TSN flows consume
Congestion loss, the statistical overflowing too much3 of a particular resource, such as the
of an output buffer in a network node, is the bandwidth of a particular link, TSN traffic can be
principle cause of packet loss in a best-ef- paced so that the customary best-effort Quality
fort network. By pacing the delivery of pack- of Service practices such as priority scheduling,
ets and allocating sufficient buffer space for weighted fair queuing, random early discard, etc.,
TSN flows, congestion is eliminated, and any still function in their usual manner, except that
given TSN flow can be promised a worst- the bandwidth available to these capabilities is 3 “Too much” has no fixed

case latency for delivering its packets end-to- reduced by the TSN traffic. Furthermore, data not definition. IEEE 802.1 has
end through the network. subject to a TSN contract (“non-TSN” traffic) can used 75% as a design goal
for the upper limit to the
b) Ultra-reliable packet delivery. Having elimi- use any contracted bandwidth unused by a TSN proportion of traffic that is
nated congestion loss, the next most import- flow. Deterministic.

IEEE Communications Standards Magazine • June 2018 23


Characteristic Constant bit rate Best-effort TSN

Connectionless? Connections only Connectionless Allocated resources along fixed paths

Statistical: subject to semi-random fluctuations Bounded: latency cannot exceed a specified


End-to-end latency Constant for all flows sharing a path
due to congestion or equipment failure maximum

In-order delivery except when network topol- In-order delivery except when lost packets are
In-order delivery In-order
ogy changes recovered

Limited by minimum latency and bounded


Latency variation Essentially zero Statistical, often low
latency

Response to equipment Detect failure, switch to alternate path (1:1 Detect failure, propagate new topology, alter Packet replication and elimination: no failure
failure or 1+1) local routing decisions detection or response mechanism

Primary causes of packet Random events (cosmic rays, signal/noise) Congestion: momentary overflow of output Equipment failures exceeding the number of
loss or equipment failure queue redundant paths

Packets are lost in groups whenever Packets are lost only as long as excessive equip-
Granularity of packet loss Random, relatively high probability
equipment fails or is repaired ment failures persist

Penalty for sending Depending on QoS used, excess may or may


Excess data lost; no effect on other flows Excess data lost; no effect on other flows
excess data not affect other flows

Unused contracted
Lost Available to all flows, with or without contracts Available only to non-contract flows
bandwidth
Table 1. Three types of packet service.

The reader should note that item 2c above, before its intended execution time has passed.
flexibility, is the most radical change to most exist- Thus, time synchronization is required for many
ing paradigms for supporting real-time applica- applications, so it is considered a part of TSN.
tions over best-effort networks. Other alternatives However, synchronization is separable from the
to TSN (discussed later in the section “Alternatives rest of TSN, in that none of the TSN features are
to TSN”) require network simulation, prototyping, tied to any particular means for synchronizing
and/or run-time testing to determine whether a time. The Precision Time Protocol, whose root
change to the critical flows can or cannot be sup- definition is in IEEE Std 1588, is the typical means
ported. Changes can only be made to such real- for synchronizing the network’s clocks, but other
time networks when the applications are down. algorithms can be used, if they meet the accuracy
TSN networks can be built to support a dynamic requirements of the user’s application.
environment.
Zero Congestion Loss,
Use Cases for TSN
Use cases targeted by the TSN standards include:
Bounded Latency
• Professional audio and video studios. Never an Empty Buffer
• Electrical power generation and distribution. Let us assume for a moment the usual case for
• Building automation. Ethernet, that a physical link transmits packets
• Cellular radio: interconnecting the data base- serially, rather than transmitting more than one
band processing and radio frequency blocks packet simultaneously, that a packet contains the
of a cellular radio base station (fronthaul). address of its destination(s), which is used by a
• Industrial machine-to-machine: closed-cy- forwarding node to select an output port, and
cle control loops, employing measurement, that a packet is received and checked for errors
computation, and command sub-cycles. by a forwarding node before it is transmitted to
• Automotive and other vehicle applications. the next node or to the destination. Then, every
• Service provider: CBR service over best-effort packet must be stored in a buffer for some period
networking equipment. of time at each forwarding node.
In the timing model employed for TSN, each
Time Synchronization output port has some number of first-in-first-out
The natural paradigm for dedicated digital bus- (FIFO) queues associated with it for temporary
ses is, “Do what the packet says to do when you storage of packets that are to be transmitted on
receive the packet.” Timing is synchronized by that port. Each incoming packet is examined,
the clock in the controlling device in the network, and assigned to one (or more) output ports for
and the reception of the data it transmits. Trans- transmission. On each port, it is also assigned to
mission times are short and perfectly predictable. a particular queue. As each packet finishes trans-
Given that TSN uses a network, and that the mission, one or more queue selection algorithms
cost of that network depends upon the degree (discussed later in the section “Queuing Algo-
to which the timing is fixed, the natural paradigm rithms”) cooperate to select a packet from one of
for TSN is, “Do what the packet says to do at the the port’s queues to transmit next.
time the packet says to do it.” Time is then syn- There are two reasons why the rate at which
chronized separately from the data flow; the only packets enter a given queue can vary. First, any
requirement is for an upper bound on end-to- variations in the processing of the packet for for-
end latency, so that the packet can be delivered warding will cause variations in the arrival rate

24 IEEE Communications Standards Magazine • June 2018


to the queues. Delay variation requires storage. Queuing Algorithms
If the delay time through a path is growing, the For every flow traversing
amount of data stored in the path is growing, so The queuing algorithms discussed below are a forwarding node, suffi-
the arrival rate at the next hop is slower, and if the defined by IEEE 802.1, mostly in IEEE Std 802.1Q, cient data is buffered in a
delay time is shrinking, the stored data is being Bridges and Bridged Networks.
dumped, and the arrival rate is higher. Second, Credit Based Shaper (CBS): Defined by clause forwarding node to ensure
the queuing algorithms used in the immediately 35 of IEEE Std 802.1Q-2014. This shaper outputs that a transmission
preceding hops may cause bursts or gaps in the packets at a rate such that, over a relatively short
rate at which any given flow’s packets are trans- term, is equal to the total bandwidth allocated to opportunity for that flow is
mitted. There is, by definition, a rate at which any the TSN flows using that queue. The worst-case never missed, unless the
given flow is transmitted, but the timescale over delay that the CBS queues can impose on the source of the flow slows
which that rate is measured can be many packet highest-priority best-effort queue (which is always
transmission times in length, so small-scale varia- lower priority than all of the CBS queues) is com- or stops. That is, for every
tions are common. putable. flow, at every hop, over
When the input rate to a queue exceeds the Time-Scheduled Queues: Defined by IEEE Std
output rate for a sufficient length of time, the 802.1Qbv. All queues (not just the TSN queues) some finite time scale,
queue must overflow. This is congestion loss, and on a given port are attached to a rotating sched- the input rate equals the
this is what TSN seeks to avoid. ule, which in turn is regulated by a clock syn- output rate.
Imagine a complete saturated TSN network, in chronized with the other bridges. The network
which all data is critical, and 100% of each link’s manager can set queue-on and queue-off events
bandwidth is allocated to some number of TSN on a 1-ns granularity, although an implementation
flows using that link. Every source is transmitting at may be less accurate in practice.
exactly its allotted rate. The flows traverse the net- Creating a schedule for a set of applications
work in all directions; no two flows take exactly the is not a trivial computational task. For example, a
same path through the network. Imagine that there network schedule may be constrained to provide
are no variations in the forwarding delay. frequent transmission opportunities for non-TSN
Imagine, now that one flow, flow A, stops. traffic, so that the most important best-effort flows
On some output port through which flow A was (VoIP or routing protocols) can achieve their
passing, when the transmission opportunity for latency goals. Time-scheduled queues are very
one of flow A’s packets comes up, the node must flexible; they can be used to achieve goals very
either output nothing, or output a packet belong- different from TSN bounded latency.
ing to some other flow B. If it outputs a packet Transmission Preemption: Defined by IEEE
from flow B, then in the long term, it is exceed- Std 802.1Qbu and IEEE Std 802.3br. These stan-
ing the normal rate for flow B, and runs the risk dards allow some queues on an output port to
of overflowing the queues for flow B in the next be designated by network management as “pre-
hop. With sufficient analysis, it may be possible to emptable” and others as “preempting.” Packets
determine the limits for how much excess data in that have started transmission from a preemptable
flow B, or flow C, from this and from other ports queue can be interrupted if a preempting queue
feeding the next hop, can be accommodated is selected for transmission. Transmission of the
before causing an overflow. preempted packet is resumed from the interrup-
However, this analysis is very difficult. TSN tion when there are no more preempting queues
avoids the analysis by transmitting nothing (or selected for transmit. This reduces the degree to
transmitting a non-TSN packet) when it has noth- which non-TSN packets can interfere with the
ing to transmit for a given flow. This leads to TSN transmission of TSN packets.
making the following requirement for network Input Scheduling and Cyclic Queuing and For-
nodes: warding (CQF): Defined by two standards, IEEE
For every flow traversing a forwarding node, Std 802.1Qci and IEEE Std 802.1Qch. A rotating
sufficient data is buffered in a forwarding node schedule, as for time-scheduled queues, above,
to ensure that a transmission opportunity for that is defined both on input ports and output ports.
flow is never missed, unless the source of the flow The net result is that packets progress through the
slows or stops. That is, for every flow, at every hop, network in groups, stopping for exactly one output
over some finite time scale, the input rate equals schedule cycle time at each hop.
the output rate. Asynchronous Traffic Shaping (ATS): This is a
new project, IEEE P802.1Qcr. The intention is to
Buffer Allocation have a mechanism that gives better overall laten-
The only way to provide zero congestion loss is to cy than CQF, but is not too much more expensive
be able to predict the worst-case buffer require- to implement.
ment. This is possible because:
• Input rate = output rate for each flow (see Packet Replication and
the previous section).
• Each queuing algorithm suitable for TSN (see Elimination
the next section) defines its own mathemati- IEEE Std 802.1CB contains a very complete intro-
cally analyzable packet selection schedules. duction to Frame Replication and Elimination for
The worst-case variations from one hop’s output Reliability (FRER) in its clause 7. The essential fea-
can be set against the worst-case variations in the tures of FRER (see Figure 4) are:
next hop’s output to get the number of buffers in • To every packet from a source, or in a partic-
the next hop required for queue selection varia- ular flow, a sequence number is added.
tion. These can be added to the worst-case for- • The packets are replicated, creating two (or
warding delays to get the number of buffers that more) identical packet flows. These flows
must be allocated to the queue. can be unicast flows or multicast flows.

IEEE Communications Standards Magazine • June 2018 25


•A selection of bridges and end stations must
A B C be made, including a selection of capabilities for
Transmitter Receiver
serializes eliminates each device. The physical topology of the net-
and duplicates work must be established.
•The static characteristics of the network must
based on
be defined. Examples of the choices to be made
replicates include the selection of topology control proto-
packets sequence
into two D E F number cols used for non-TSN traffic, and perhaps for TSN
flows traffic as well, the maximum bandwidth to be allo-
cated for TSN flows on each physical link, and a
Figure 4. Packet replication and elimination.
selection of protocol(s) and parameters for time
synchronization. One may statically create subsets
of the physical topology to be used for FRER paths.
Transmitter Receiver •One or more means for creating band-
serializes eliminates width reservations must be selected, and then
and duplicates
Nodes B and E employed. Reservations can be controlled statical-
eliminate red/green
duplicates based on ly by management action. They can be controlled
replicates
serial number based on through the action of application end stations,
packets sequence bridges, or management stations, using the reser-
into two number
flows vation protocols defined in IEEE Std 802.1Q and/
or IEEE Std 802.1Qca.
Figure 5. Packet replication and elimination. •An architecture for the dynamic control of
flow reservations must be selected, if required
by the application(s) using TSN. Each application
• At some point at or near the receiving end end station and bridge can make independent
station(s), the duplicate packets are detected reservation decisions using the selected protocols.
and eliminated. The bridges can defer reservation decisions to
This technique is similar to the typical 1+1 a central network controller. Often, there exists
scheme used by CBR technologies, differing in an “application controller” entity that controls a
that a 1+1 receiver selects one stream to pass time-sensitive application. This controller can be
and one to ignore, while FRER makes a pack- a part of the network controller, it can order the
et-by-packet choice. FRER is proof against any end stations to make reservations, or it can ask
singe failure in the network. Of course, the trans- the network controller for reservations on behalf
mitting and receiving stations themselves are sin- of the end stations. (See IEEE P802.1Qcc.)
gle points of failure, but many applications can The standards to fully support some of the
provide redundant transmitters and receivers to above options are still under development in IEEE
overcome this. 802.1.
• The network can also be configured to dis-
card and re-replicate packets at various Alternatives to TSN
points in order to be able to handle multiple Some real-time systems have been controlled
failures. using Ethernet since the technology was invent-
We can see in Fig. 5 that some two-failure ed in the 1980s. The alternatives often employed
events, such as the failure of A and F, B and C, include:
or D and F, will not cause the loss of a packet. A • Overprovisioning: One builds a network that
failure of both A and D, however, would stop the has significantly more physical link band-
flow. More complex configurations are possible. width and buffer space than is required by
In-order delivery is not required by the stan- the critical data.
dard because bulk flows could require network • Isolation: A network, physically isolated from
nodes to have large buffers to put the packets other networks, is constructed for the exclu-
back in sequence. sive use of one or a small number of critical
This is also exactly the technique described by applications.
ISO/IEC 62439-3 (discussed later in the section • Prioritization: Critical data is given the highest
“Other Relevant Standards). In fact, 62439-3 pre- priority in the network, perhaps even higher
dates the work on IEEE 802.1CB. Both standards than network control traffic, to minimize the
operate only at Layer 2 with bridges. Both use impact of non-critical on critical traffic.
16-bit sequence numbers. • Weighted fair queuing (WFQ) and similar pri-
oritization schemes: Bandwidth and resourc-
Control and Management es can be allocated to be statistically fair
The IEEE TSN standards provide a rich set of man- among critical flows.
agement controls for creating a TSN network, start- • Congestion detection: This technique typical-
ing with the plug-and-play profile IEEE Std 802.1BA, ly causes a flow that is experiencing conges-
which allows some applications (audio/video, in tion to slow down. This is not applicable to
particular) to be supported without requiring a the applications for which TSN is designed;
knowledgeable network administrator. In such a these applications cannot slow down the
network, the senders, receivers, and bridges use real-time physical world to accommodate
the protocols defined in IEEE Std 802.1Q to make the network’s fluctuating load.
bandwidth reservations. FRER is not supported. • Congestion avoidance: Routing flows over
There are four aspects to the use of control less-congested network paths. This can work
and management to fully utilize TSN capabilities at the time a flow is established, but after-
in a network: wards, its efficacy declines.

26 IEEE Communications Standards Magazine • June 2018


The techniques listed above suffer from one The 802.1 TSN TG has produced a number of
or more of the following difficulties, compared standards. IEEE 802.1 standards are, for the most In 2015, a Deterministic
to TSN: part, confined to Layer 2. That is, only bridged Networking (TSN) Work-
1. Statistical vs. deterministic: Most of the networks are supported, and data flows that ing Group was created in
above techniques reduce the probability of pack- require a router are not supported end-to-end.
et loss or late delivery, but most do not prevent it The TSN standards have augmented the tech- the Internet Engineering
absolutely. An engineer must balance the degree niques of AVB to include better reservation (con- Task Force (IETF). This
of overprovisioning against the probability of late tract creation) protocols, more queue draining
delivery or packet loss. techniques, and HSR/PRP-like packet replication. group is expanding TSN
2. Predictability: In all of the schemes above, A number of standards are currently in progress, concepts to include rout-
the only way to determine whether a given mix of including a profile of TSN standards to enable ers, so that the techniques
critical flows will achieve the required level of reli- the use of time-sensitive networking for cellular
ability is to try the application and see if it works, fronthaul. developed in TSN can
either by simulation or by actual experiment. In 2015, a Deterministic Networking (TSN) be extended to routed
3. Corner cases: Only the most detailed and Working Group was created in the Internet Engi-
exhaustive simulation exercises can give one con- neering Task Force (IETF). This group is expand- data flows. It also has a
fidence that there is no corner case, when just the ing TSN concepts to include routers, so that the goal to scale up the TSN
wrong processes are turned on or off at just the techniques developed in TSN can be extended techniques so that they
right moment, that will disrupt some critical flow. to routed data flows. It also has a goal to scale
4. Dynamism: The lack of predictability means up the TSN techniques so that they work in larg- work in larger networks
that, for the most part, changes to any application er networks than can be supported by Ethernet than can be supported by
or to the network can only be performed when bridges.
the network is not in use. Every dynamic choice Ethernet bridges.
accommodated (e.g. turning an application on
Standards Summary
or off) increases the simulation and testing load IEEE 802.1 AVB, 802.1 TSN,
exponentially. and 802.3 Standards
5. Standardization: There exist a number of Standards listed as “IEEE Std 802.xyz-2xxx” are
Ethernet-based solutions employing proprietary complete, published standards. Those listed as
techniques for the network nodes and/or the “IEEE P802.xyz” (note the “P”) are works in prog-
MAC/PHY hardware, that solve many or all of ress. A given standard or work in progress can be
the problems addressed by TSN. These propri- either a stand-alone document, or an amendment
etary solutions are generally more expensive to a previous standard, as indicated in the text.
for the customers than solutions based on open See the 802.1 web site (http://www.ieee802.
standards. (Some of these techniques are, in fact, org/1) for the most up-to-date information.
being included in the TSN standards.) Important Note: IEEE 802 standards must be
6. Expense: Strict isolation, i.e., one network purchased from the IEEE (http://standards.ieee.
per application, in combination with the other org/findstds/) for the first six months after pub-
techniques shown above, can solve all of these lication, and are available free from the GetIEEE
problems. But this solution is expensive. web site (http://standards.ieee.org/about/get/)
Note, however, that there do exist standard after that time. IEEE 802.1 works in progress are
techniques that can provide the low or zero con- available from the IEEE 802.1 web, using a user-
gestion loss features of TSN (e.g., IETF RFC2998). name and password, to anyone, IEEE member or
not, interested in making helpful comments to
History further the work of the committee.
IEEE 802.1 created an Audio Video Bridging A. IEEE Std 802.1AS-2011–Timing and Synchro-
(AVB) Task Group in 2007. Its goal was to replace nization
HDMI, speaker, and RCA cables in the home with B. IEEE Std 802.1Q-2014–Bridges and Bridged
Ethernet. A secondary goal was the small audio Networks
or video production studio. The standards pro- C. IEEE Std 802.1BA-2009–Audio Video Bridg-
duced supported time synchronization through an ing (AVB) Systems
802.1-specified profile of IEEE 1588, a reservation D. IEEE Std 802.1CB-2017–Frame Replication
protocol for transmitters, receivers, and bridges to and Elimination for Reliability
create contracts, a queue draining technique (the E. IEEE Std 802.1Qbu-2016–Frame Preemption
credit-based shaper) to enforce the contracts, and (amendment to 802.1Q)
an overall profile specification that specified how F. IEEE Std 802.3br–Interspersing Express Traffic
to configure standard components to implement G. P802.1Qcc–Stream Reservation Proto-
a plug-and-play home or small studio. AVB works col (SRP) Enhancements and Performance
only in bridged Layer 2 networks. Improvements (amendment to 802.1Q)
HSR/PRP: ISO/IEC 62439-3 defines the H. IEEE Std 802.1Qbv-2015–Enhancements for
High-availability Seamless Redundancy (HSR) and Scheduled Traffic (amendment to 802.1Q)
the Parallel Redundancy Protocol (PRP) as well as I. IEEE Std 802.1Qca-2015–Path Control and
a profile of IEEE 1588. They provide protection Reservation (amendment to 802.1Q)
against packet loss due to chance or equipment J. IEEE Std 802.1Qch-2017–Cyclic Queuing
failure, but do not offer bounded latency or zero and Forwarding (amendment to 802.1Q)
congestion loss. K. IEEE Std 802.1Qci-2017–Per-Stream Filtering
Demand from the industrial control communi- and Policing (amendment to 802.1Q)
ty and from the automotive community led to the L. IEEE P802.1CM–Time-Sensitive Networking
renaming of the IEEE 802.1 AVB Task Group to for Fronthaul
the Time-Sensitive Network (TSN) Task Group in M. IEEE P802.1Qcr–Asynchronous Traffic Shap-
2012, and a broadening of its goals. ing (amendment to 802.1Q)

IEEE Communications Standards Magazine • June 2018 27


IETF DetNet Drafts Other Relevant Standards
As yet, there are no RFCs or Standards from the A. IEEE Std 1588-2008–Precision Clock Syn-
IETF Deterministic Networking (DetNet) work- chronization Protocol for Networked Mea-
ing group. Internet drafts are works in progress, surement and Control Systems
and quickly become out-of-date. See the DetNet B. ISO/IEC 62439-3:2016–Industrial Communi-
documents list (https://datatracker.ietf.org/wg/ cation Networks–High Availability Automa-
detnet/documents/) for the most up-to-date list tion Networks
of DetNet drafts. The drafts listed here have been C. IETF RFC2998–A Framework for Integrated
adopted by the DetNet Working Group. Services Operation over Diffserv Networks
A. Deterministic Networking Problem State-
ment Biography
B. Deterministic Networking Use Cases Norman Finn (nfinn@alumni.caltech.edu) received his B.S. in
C. Deterministic Networking Architecture astronomy from the California Institute of Technology. His stan-
dards work includes ATM LAN Emulation, ITU-T Ethernet OAM,
D. DetNet Data Plane solution and numerous IEEE 802 projects: VLANs, Link Aggregation, Link
E. Deterministic Networking (DetNet) Security Layer Discovery Protocol. He has edited nine IEEE 802.1 and
Considerations 802.11 standards. He currently represents Huawei for Time-Sen-
sitive Networking in IEEE 802 and in the IETF. He has been
awarded more than 100 patents.

28 IEEE Communications Standards Magazine • June 2018

You might also like