<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
     There has to be one entity for each item to be referenced. 
     An alternate method (rfc include) is described in the references. -->
<!ENTITY IOAMData SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-ippm-ioam-data-10.xml">
<!ENTITY IOAMIPv6 SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-song-ippm-ioam-ipv6-support-00.xml">
<!ENTITY SRV6OAM SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-6man-spring-srv6-oam-07.xml">
<!ENTITY SRV6PBT SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-song-6man-srv6-pbt-01.xml">
<!ENTITY IOAMDataEncap SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-brockners-inband-oam-transport-05.xml">
<!ENTITY IOAMSFC SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-sfc-ioam-nsh-00.xml">
<!ENTITY IOAMGENEVE SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-brockners-ippm-ioam-geneve-01.xml">
<!ENTITY IOAMDX SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-ippm-ioam-direct-export-00.xml">
<!ENTITY IOAMGRE SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-weis-ippm-ioam-gre-00.xml">
<!ENTITY IOAMRAWEXP SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-spiegel-ippm-ioam-rawexport-01.xml">
<!ENTITY NSH SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-sfc-nsh-28.xml">
<!ENTITY Postcard SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml7/reference.DOI.10.1145/2342441.2342453.xml">
<!ENTITY SYNLABEL SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-bryant-mpls-synonymous-flow-labels-01.xml">
<!ENTITY RFC3176 SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3176.xml">
<!ENTITY NETCONF SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml">
<!ENTITY IPFIX SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY ICMP SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2925.xml">
<!ENTITY RFC6020 SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6020.xml">
<!ENTITY RFC8321 SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8321.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
     please see http://xml.resource.org/authoring/README.html. -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation --> <!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="3"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="info" docName="draft-song-ippm-postcard-based-telemetry-09" ipr="trust200902">
  <front>
    <title abbrev="PBT using Packet Marking">Postcard-based On-Path Flow Data Telemetry using Packet Marking</title>

    <author fullname="Haoyu Song" initials="H." surname="Song">
      <organization>Futurewei Technologies</organization>
      <address>
        <postal>
          <street>2330 Central Expressway</street>
          <city>Santa Clara, 95050</city>
          <country>USA</country>
        </postal>
        <email>hsong@futurewei.com</email>
      </address>
    </author>

    

	<author fullname="Greg Mirsky" initials="G." surname="Mirsky">
      <organization>ZTE Corp.</organization>
      <address>
             <postal>
          <street></street>
          <city></city>
          <country></country>
        </postal>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>

	<author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
      <organization>Cisco Systems, Inc.</organization>
      <address>
             <postal>
          <street></street>
          <city></city>
          <country>Belgium</country>
        </postal>
        <email>cfilsfil@cisco.com</email>
      </address>
    </author>

	<author fullname="Ahmed Abdelsalam" initials="A." surname="Abdelsalam">
      <organization>Cisco Systems, Inc.</organization>
      <address>
             <postal>
          <street></street>
          <city></city>
          <country>Italy</country>
        </postal>
        <email>ahabdels@cisco.com</email>
      </address>
    </author>

	<author fullname="Tianran Zhou" initials="T." surname="Zhou">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>156 Beiqing Road</street>
          <city>Beijing, 100095</city>
          <country>P.R. China</country>
        </postal>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>

    <author fullname="Zhenbin Li" initials="Z." surname="Li">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>156 Beiqing Road</street>
          <city>Beijing, 100095</city>
          <country>P.R. China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
	
    <author fullname="Jongyoon Shin" initials="J." surname="Shin">
      <organization>SK Telecom</organization>

      <address>
        <postal>
          <street></street>

          <city></city>

          <country>South Korea</country>
        </postal>

        <email>jongyoon.shin@sk.com</email>
      </address>
    </author>


    <author fullname="Kyungtae Lee" initials="K." surname="Lee">
      <organization>LG U+</organization>

      <address>
        <postal>
          <street></street>

          <city></city>

          <country>South Korea</country>
        </postal>

        <email>coolee@lguplus.co.kr</email>
      </address>
    </author>

    <date day="18" month="February" year="2021"/>

    <area>Operation and Management Area</area>
    <workgroup>IPPM</workgroup>

    <keyword>telemetry, OAM, postcard</keyword>

    <abstract>
      <t>
	 The document describes a packet-marking variation of the Postcard-Based Telemetry (PBT), referred to as PBT-M. 
     Unlike the instruction-based PBT, as embodied in IOAM DEX,  PBT-M does not require 
     the encapsulation of a telemetry instruction header, so it avoids some of the implementation challenges of the instruction-based PBT.
     However, PBT-M has unique issues that need to be considered.	 
     This document serves as a scheme overview and provides design guidelines applicable to implementations in different network protocols.     
      </t>
    </abstract>
  </front>

  <middle>

    <section title="Motivation">
      <t>To gain detailed data plane visibility to support effective network OAM, 
	 it is essential to be able to examine the trace of user packets along their forwarding paths. Such on-path flow data reflect  
	 the state and status of each user packet's real-time experience and provide valuable information 
	 for network monitoring, measurement, and diagnosis. 
      </t>
        
      <t>The telemetry data include but not limited to the detailed forwarding path, the timestamp/latency at each network node, and, in case of
       packet drop, the drop location, and the reason. 
	 The emerging programmable data plane devices allow user-defined data collection
	 or conditional data collection based on trigger events.
	 Such on-path flow data are from and about the live user traffic, which 
	 complements the data acquired through other passive and active OAM mechanisms such as 
	 <xref target="RFC7011">IPFIX</xref> and <xref target="RFC2925">ICMP</xref>. 
      </t>
            
      <t> On-path telemetry was developed to cater to the need of collecting on-path flow data. 
        There are two basic modes for on-path telemetry: the passport mode and the postcard mode.
        In the passport mode, each node on the path
        adds the telemetry data to the user packets (i.e., stamp the passport). The accumulated data-trace 
		carried by user packets are exported at a configured end node. In the postcard mode, each
        node directly exports the telemetry data using an independent packet (i.e., send a postcard)
        to avoid the need for carrying the data with user packets.</t>  
          
	 <t> <xref target="I-D.ietf-ippm-ioam-data"> In-situ OAM trace option (IOAM) </xref> is a representative of the passport mode on-path telemetry.
        A prominent advantage of the passport mode is that it naturally
        retains the telemetry data correlation along the entire path. The
        passport mode also reduces the number of data export packets. 
		These help to simplify the data collector and analyzer's work. On the other hand, the
        passport mode faces the following challenges.</t>
        
        <t> 
         <list style="symbols">
           <t>
	     Issue 1: Since the telemetry instruction header and data processing must be done in the data-plane fast-path, 
            it may interfere with the normal traffic forwarding 
	     (e.g., leading to forwarding performance degradation) and lead to inaccurate measurements 
	     (e.g., resulting in longer latency measurements than usual). 
	     This undesirable "observer effect" is problematic to carrier networks where stringent SLA must be observed.  
           </t><t>
             Issue 2: The passport mode may significantly increase the user packet's original size by adding data at each on-path node. 
	     The size may exceed the path MTU, so either the technique cannot apply, or the packet needs to be fragmented.
         That could be challenging when other network service headers (e.g., segment routing or service function chaining) are also present. 
	     Limiting the data size or path length reduces the effectiveness of INT. 
           </t><t>
	     Issue 3: The instruction header needs to be encapsulated into user packets for transport. <xref target="I-D.brockners-inband-oam-transport"></xref> 
	     has discussed several encapsulation approaches for different transport protocols. 
	     So far, there is no feasible solution to encapsulate the instruction header in MPLS and IPv4 networks, which are still the most widely deployed. 
         It is also challenging to encapsulate the instruction header in IPv6 <xref target="I-D.song-ippm-ioam-ipv6-support" />.
	   </t><t>
	     Issue 4: The telemetry information is transported in plain text along the network paths. The instruction header and data are vulnerable to eavesdropping and tampering as well as DoS attack.
	     Extra protective measurement is difficult on the data-plane fast-path. 
	   </t><t>
	     Issue 5: Since the passport mode only exports the telemetry data at the designated end node, 
	     if the packet is dropped in the network, the data will be lost as well. 
	     It cannot pinpoint the 
	     packet drop location, which is desired by fault diagnosis. Even worse, the end node may be unaware of the packet and data loss at all.
	   </t>
         </list>
      </t>       

        <t>The postcard mode provides a perfect complement to the passport
        mode. In the variant of the postcard-based telemetry (PBT) which uses an instruction header, the postcards that carry telemetry data can be generated 
		by a node's slow path and transported in-band or out-of-band, independent of the original user packets. 
        <xref target="I-D.ietf-ippm-ioam-direct-export"> IOAM direct export option (DEX) </xref> is a representative of PBT. 
        Since an instruction header is still needed while successfully addressing issue 2 and 5 and partially addressing issue 1 and 4, 
            this type of instruction-based PBT still cannot address issue 3.</t>
        
        
        <t>This document describes another variation of the postcard mode on-path telemetry, the marking-based PBT (PBT-M). 
     Unlike the instruction-based PBT, PBT-M does not require 
     the encapsulation of a telemetry instruction header, so it avoids some of the implementation challenges of the instruction-based PBT.
     However, PBT-M has unique issues that need to be considered.	 
     This document discusses the challenges and their solutions of the marking-based PBT. </t>  
            
      
    </section>

    <section title="PBT-M: Marking-based PBT">

      <t>As the name suggests, PBT-M only needs a marking-bit in the existing headers of user packets to trigger the telemetry data collection and export. 
          The sketch of PBT-M is as follows. 
		  If on-path data need to be collected, the user packet is marked at the path head node.   
          At each PBT-aware node, if the mark is detected, a postcard (i.e., the dedicated OAM packet triggered by a marked user packet) is generated and sent to a collector. 
	  The postcard contains the data requested by the management plane. 
	  The requested data are configured by the management plane.   
	  Once the collector receives all the postcards for a single user packet, it can infer the packet's forwarding path and analyze the data set. 
	  The path end node is configured to unmark the packets to its original format if necessary. 
	</t><t>
          The overall architecture of PBT-M is depicted in Figure 1. 

	</t><t>
        
	<figure title="Architecture of PBT-M" anchor="figure_1">
          <artwork>

                      +------------+        +-----------+ 
                      | Network    |        | Telemetry | 
                      | Management |(-------| Data      | 
                      |            |        | Collector | 
                      +-----:------+        +-----------+ 
                            :                     ^ 
                            :configurations       |postcards 
                            :                     |(OAM pkts) 
             ...............:.....................|........
             :             :               :      |       :
             :   +---------:---+-----------:---+--+-------:---+
             :   |         :   |           :   |          :   |
             V   |         V   |           V   |          V   |
          +------+-+     +-----+--+     +------+-+     +------+-+
usr pkts  | Head   |     | Path   |     | Path   |     | End    |
     ====>| Node   |====>| Node   |====>| Node   |====>| Node   |===>
          |        |     | A      |     | B      |     |        |
          +--------+     +--------+     +--------+     +--------+
        mark usr pkts  gen postcards  gen postcards  gen postcards
        gen postcards                                unmark usr pkts  

          </artwork>
         </figure>

	</t>
          
      <t>    
        PBT-M aims to address the issues listed above. It also introduces some new benefits. The advantages of PBT-M are summarized as follows.  
      </t>	      

        <t>
          <list style="symbols">
            <t>
              1: PBT-M avoids augmenting user packets with new headers and introducing new data plane protocols. 
	      The telemetry data collecting signaling remains in the data plane. 
	    </t><t>
              2: PBT-M is extensible for collecting arbitrary new data to support possible future use cases. 
	      The data set to be collected can be configured through the management plane or control plane. 
	      Since there is no limitation on the types of data, any data other than those defined in <xref target="I-D.ietf-ippm-ioam-data"/> can also be collected. 
	       Since there is no size constraint anymore, it is free to use a more flexible data set template for data type definition. 
	    </t><t>
              3: PBT-M avoids interfering with the normal forwarding and affecting the forwarding performance. 
	      Hence, the collected data are free to be transported independently through in-band or out-of-band channels. 
	      The data collecting, processing, assembly, encapsulation, and transport are, therefore, decoupled 
	      from the forwarding of the corresponding user packets and can be performed in data-plane slow-path if necessary. 
	    </t><t>
              4: For PBT-M, the types of data collected from each node can vary depending on application requirements and node capability. 
	      This is either impossible or very difficult to be supported by the passport mode in which the instruction header 
		  conveys data types collected 
	      per node.
	    </t><t>
              5: PBT-M makes it easy to secure the collected data without exposing it to unnecessary entities. 
	      For example, both the configuration and the telemetry data can be encrypted before being transported,
	      so passive eavesdropping and a man-in-the-middle attack can both be deterred.
	    </t><t>
	          6: Even if a user packet under inspection is dropped at some node in the network, 
	      the postcards collected from the preceding nodes are still valid and can be used to 
	      diagnose the packet drop location and reason.
            </t>
         </list>
        </t>
        
      </section>

      <section anchor="challenge" title="New Challenges">
	   <t>
          Although PBT-M addresses the issues of the passport mode telemetry and the instruction-based PBT, it introduces a few new challenges. 
        </t><t>
	  <list style="symbols">
            <t>
              Challenge 1 (Packet Marking): A user packet needs to be marked to trigger the path-associated data collection. 
			  Since the PBT-M does not augment user packets with any new header fields, 
	          it needs to reserve or reuse bits from the existing header fields.
			  This raises a similar issue as in <xref target="RFC8321">the Alternate Marking Scheme</xref>
            </t><t> 	      
			  Challenge 2 (Configuration): Since the packet header will not carry OAM instructions anymore, 
	          the data plane devices need to be configured to know what data to collect. 
	          However, in general, the forwarding path of a flow packet (due to ECMP or dynamic routing) is unknown beforehand (note that there are some
              notable exceptions, such as segment routing). If the per-flow customized data collection is required, 
	          configuring the data set for each flow at all data plane devices might be expensive in terms of configuration load and data plane resources.
	        </t><t>  
              Challenge 3 (Data Correlation): Due to the variable transport latency, the dedicated postcard packets for a single packet may arrive at the collector 
	          out of order or be dropped in networks for some reason. In order to infer the packet forwarding path, 
	          the collector needs some information from the postcard packets to identify the user packet affiliation and the order of path node traversal.  
            </t><t>
              Challenge 4 (Load Overhead): Since each postcard packet has its header, the overall network bandwidth overhead of PBT is higher than IOAM. 
			  A large number of postcards could add processing pressure on data collecting servers. That can be used as an attack vector for DoS. 
            </t>            
          </list>
        </t>  
      </section>

    <section title="PBT-M Design Considerations">
        <t>      
          To address the above challenges, we propose several design details of PBT-M.
        </t>	      
	  <section title ="Packet Marking">
          <t>
            To trigger the path-associated data collection, usually, a single bit from some header field is sufficient. 
	    While no such bit is available, other packet-marking techniques are needed. 
	    We discuss several possible application scenarios.
	    </t><t>
	    <list style="symbols">
              <t>
		IPv4. <xref target="RFC8321">Alternate Marking (AM)</xref> is an IP flow performance measurement 
		framework that also requires a single bit for packet coloring. 
		The difference is that AM does in-network measurement while PBT-M only collects and exports data at network nodes 
		(i.e., the data analysis is done at the collector rather than in the network nodes). AM suggests to use some reserved bit of the Flag field or 
		some unused bit of the TOS field. Actually, AM can be considered a sub-case of PBT-M, so that the same bit can be used for PBT-M.  
		The management plane is responsible for configuring the actual operation mode.
              </t><t>	
	        SFC NSH. The OAM bit in the NSH header can be used to trigger the on-path data collection <xref target="I-D.ietf-sfc-nsh"></xref>. 
	        PBT does not add any other metadata to NSH.
	      </t><t>
	        MPLS. Instead of choosing a header bit, we take advantage of <xref target="I-D.bryant-mpls-synonymous-flow-labels"> 
		the synonymous flow label </xref> approach to mark the packets. A synonymous flow label indicates 
		the on-path data should be collected and 
		forwarded through a postcard.
              </t><t>
            SRv6: A flag bit in SRH can be reserved to trigger the on-path data collection <xref target="I-D.song-6man-srv6-pbt"/>. <xref target= "I-D.ietf-6man-spring-srv6-oam">SRv6 OAM</xref> 
		has adopted the O-bit in SRH flags as the marking bit to trigger the telemetry.  
            </t>
            </list>
          </t>
        </section>	  
	  <section title ="Flow Path Discovery">
          <t>
            In case the path that a flow traverses is unknown in advance, all PBT-aware nodes should be configured to react to the marked packets by 
            exporting some basic data, such as node ID and TTL before a data set template for that flow is configured. 
	    This way, the management plane can learn the flow path dynamically. 
          </t><t>	
            If the management plane wants to collect the on-path data for some flow, 
	    it configures the head node(s) with a probability or time interval for the flow packet marking. 
	    When the first marked packet is forwarded in the network, the PBT-aware nodes will export the basic data set to the collector. 
	    Hence, the flow path is identified. If other data types need to be collected, 
	    the management plane can further configure the data set's template to the target nodes on the flow's path. 
	    The PBT-aware nodes collect and export data accordingly if the packet is marked and a data set template is present. 
          </t><t>	
	    If the flow path is changed for any reason, the new path can be quickly learned 
	    by the collector. Consequently, the management plane controller can be directed 
	    to configure the nodes on the new path. The outdated configuration can be automatically timed out or 
	    explicitly revoked by the management plane controller.
          </t>	
        </section>	  
	  <section anchor="correlation" title ="Packet Identity for Export Data Correlation">
          <t>
            The collector needs to correlate all the postcard packets for a single user packet. 
	    Once this is done, the TTL (or the timestamp, if the network time is synchronized) 
	    can be used to infer the flow forwarding path. The key issue here is to correlate all the postcards for the same user packet. 
          </t><t>	
	    The first possible approach includes the flow ID plus the user packet ID in the OAM packets. 
            For example, the flow ID can be the 5-tuple IP header of the user traffic, and
	    the user packet ID can be some unique information pertaining to a user packet (e.g., the sequence number of a TCP packet).
          </t><t>	
            If the packet marking interval is large enough, the flow ID is enough to identify a user packet. 
	    As a result, it can be assumed that all the exported postcard packets for the same flow during a short time interval belong to the same user packet.
          </t><t>	
            Alternatively, if the network is synchronized, then the flow ID plus the timestamp at each node can also infer the postcard affiliation. 
	    However, some errors may occur under some circumstances. For example, 
	    two consecutive user packets from the same flows are marked, but one exported postcard from a node is lost. 
	    It is difficult for the collector to decide to which user packet the remaining postcard is related. 
	    In many cases, such a rare error has no catastrophic consequence. Therefore it is tolerable.    
          </t>	
      </section>	  
    
      <section title ="Control the Load">
	  
		   <t>PBT-M should not be applied to all the packets all the time. It is better to be used in an interactive environment where the 
		   network telemetry applications dynamically decide which subset of traffic is under scrutiny. The network devices can limit the PBT rate
           through sampling and metering. The PBT packets can be distributed to different servers to balance the processing load. </t>	

           <t>It is important to understand that the total amount of data exported by PBT-M is identical to that of IOAM. The only extra overhead is
           the packet header of the postcards. In the case of IOAM, it carries the data from each node throughout the path to the end node before exporting the 
           aggregated data. On the other hand, PBT-M directly exports local data. The overall network bandwidth impact depends on the network topology and scale,  		   
           and PBT-M could be more bandwidth efficient. 
           </t> 		   
	  
	  </section>
         
    </section>	    

    <section title="Implementation Recommendation">
	
	  <section title="Configuration">
		   <t> The head node's ACL should be configured to filter out the target flows for telemetry data collection. Optionally, a flow packet 
		   sampling rate or probability could be configured to monitor a subset of the flow packets. </t>
		   
		   <t> The telemetry data set that should be exported by postcards at each path node could be configured using the data set templates 
		   specified, for example, in <xref target="RFC7011">IPFIX</xref>. In future revisions, we will provide more details. </t>
		   
		   <t> The PBT-aware path nodes could be configured to respond or ignore the marked packets. </t>
	  </section>
	
      <section title="Postcard Format">

	      <t>The postcard should use the same data export format as that used by IOAM.  <xref target="I-D.spiegel-ippm-ioam-rawexport"></xref> proposes
              a raw format that can be interpreted by IPFIX. In future revisions, we will provide more details. 
	      </t> 

      </section>
	  
	  <section title="Data Correlation">
	  
		  <t>Enough information should be included to help the collector to correlate and order the postcards for a single user packet. 
		     <xref target="correlation"/> provides several possible means. The application scenario and network protocol are important 
			 factors to determine the means to use. In future revisions, we will provide details for representative applications.</t>
	  
	  </section>
	  
	</section>
	  

    <section anchor="Security" title="Security Considerations">
	    <t> Several security issues need to be considered. </t>

	    <t>
      <list style="symbols">
	<t>      
          Eavesdrop and tamper: the postcards can be encrypted and authenticated to avoid such security threats.		    
        </t><t>
	DoS attack: PBT can be limited to a single administrative domain. The mark must be removed at the egress domain edge. 
	The node can rate-limit the extra traffic incurred by postcards.	
        </t>
      </list>
      </t>      
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>
        No requirement for IANA is identified.
      </t>
    </section>

    
    <section anchor="Contributors" title="Contributors">
      <t>
		We thank Alfred Morton who provided valuable suggestions and comments helping improve this draft.
      </t>
    </section>

    <section anchor="Acknowledgments" title="Acknowledgments">
      <t>
        TBD. 
      </t>
    </section>

  </middle>

  <back>
    <references title="Informative References">
      &IPFIX;	    
      &ICMP;	    
      &IOAMData;
      &IOAMIPv6;
      &IOAMDataEncap;
      &IOAMDX;
	  &SRV6OAM;
	  &SRV6PBT;
      &NSH;
      &IOAMRAWEXP;
      &SYNLABEL;    
	  &RFC8321;
    </references>
  </back>
</rfc>

