<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-cats-oam-fw-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Computing-Aware Traffic Steering (CATS) Operations, Administration, and                     Maintenance (OAM) Framework ">Computing-Aware Traffic Steering (CATS) Operations, Administration, and Maintenance (OAM) Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-cats-oam-fw-04"/>
    <author initials="H." surname="Fu" fullname="Huakai Fu">
      <organization>ZTE Corporation</organization>
      <address>
        <email>fu.huakai@zte.com.cn</email>
      </address>
    </author>
    <author initials="B." surname="Liu" fullname="Bo Liu">
      <organization>China Mobile</organization>
      <address>
        <email>liubo@chinamobile.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenqiang Li">
      <organization>China Mobile</organization>
      <address>
        <email>lizhenqiang@chinamobile.com</email>
      </address>
    </author>
   
     <author initials="Q." surname="Xiong" fullname="Quan Xiong">
      <organization>ZTE Corporation</organization>
      <address>
        <email>xiong.quan@zte.com.cn</email>
      </address>
    </author>

    <date year="2025" month="October" day="10"/>
    <workgroup>CATS</workgroup>
    <abstract>
      <?line 55?>

<t>This document describes the OAM framework and requirements for Computing-Aware Traffic Steering (CATS). The framework defines the CATS OAM layering model and OAM components. It also describes the requirements to enable the fault and the performance management of end-to-end connections from clients to networks and finally to services instances.</t>
    </abstract>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As described in <xref target="I-D.ietf-cats-usecases-requirements"/>, edge computing provides lower response time and higher transmission rate than cloud computing by moving computing instances to the network edge. To meet the requirements of users that are highly distributive, service providers deploy the same type of service instances at multiple edge sites, which involves steering traffic from clients to the most appropriate computing instance.</t>
      <t>Compute-aware traffic steering (CATS) [I-D.ietf-cats-framework] is a traffic engineering approach as per <xref target="I-D.ietf-teas-rfc3272bis"/> developed to address the aforementioned traffic steering problem. This approach takes into account the dynamic nature of both the computing resources and the network states to optimize the way that traffic is forwarded towards a given service instance. Various metrics can be taken into account to devise and enforce such service-specific and computing-aware traffic steering policies.To achieve better service assurance, it is necessary to not only rapidly detect whether the QoS provided by the computing networks meets the SLA requirements of clients, but also dynamically trigger the calculation and the adjustment of both the computing and the networking services. There are some OAM technologies developed for networks, but they are only deployed to facilitate the operations and the maintenance of network operators, and cannot provide measurements of an end-to-end connection from a client to a service instance.</t>
      <t>To this end, based on the CATS framework as per [I-D.ietf-cats-framework], this document describes the OAM framework and requirements for Computing-Aware Traffic Steering (CATS). The framework defines the CATS OAM layering model and OAM components. It also describes the requirements to enable the fault and the performance management of end-to-end connections from clients to networks and finally to services instances.The deployment considerations are also described as well.</t>
    </section>
    <section anchor="Language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="Terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in [I-D.ietf-cats-
   framework].</t>
      <ul spacing="normal">
        <li>
          <t>FM: Fault Management.</t>
        </li>
        <li>
          <t>PM: Performance Monitoring.</t>
        </li>
        <li>
          <t>SI-OAM: Service Instance OAM.</t>
        </li>
        <li>
          <t>TC-OAM: Traffic Classifier OAM.</t>
        </li>
        <li>
          <t>AF-OAM: Application Flow OAM.</t>
        </li>
        <li>
          <t>IOAM: In-situ OAM.</t>
        </li>
      </ul>
    </section>
    <section anchor="Motivation">
      <name>Motivation</name>
      <t>The main objectives of OAM are to detect anomalies before they intensify, reduce the number of traffic flows impacted by these abnormalities, and ensure that network operators fulfill their QoS guarantee commitments to meet the Service Level Agreement(SLA) of clients.</t>
      <t>As a traffic engineering method, computing-aware traffic steering (CATS) takes into account the dynamic nature of both the computing resources and the network states to optimize the way that traffic is forwarded toward a given service instance. However, existing OAM technologies cannot be used to collect metrics associated with the computing resources. Therefore, it is necessary to extend the existing OAM technologies to build an end-to-end OAM for CATS. Key objectives include:</t>
      <ul spacing="normal">
        <li>
          <t>Convergence latency is compressed from the order of tens of seconds to sub-second timescale: In CATS,the status information of the computing instances is collected by the CATS Service Metric Agent (C-SMA) component and processed at the control plane for performance monitoring and failure detection. However, to limit control-plane load, such sensing mechanisms are typically engineered to operate on the order of tens of seconds.. Accordingly, rapid detection of data-plane degradation affecting both service instances and network states is mandatory, so that CATS Path Selector (C-PS) convergence is triggered and its latency compressed from tens of seconds to sub-second scale.</t>
        </li>
        <li>
          <t>Closed-loop network path evaluation : In CATS, the CATS Path Selector (C-PS) calculates and selects the paths towards appropriate egress PEs and computing service instances. In this
process, it is necessary to verify whether the calculation and the selection results meet the SLA requirements of clients taking into account both the network states and the computing instance status.</t>
        </li>
        <li>
          <t>Closed-loop service SLAs guarantee for flows : In CATS, subsequent packets of service flows in an established session are forwarded through the CATS Traffic Classifier (C-TC) to the same service instance. However, during such a process, the computing/network performance may degrade. To ensure consistent experience for end users, it is necessary to measure the flow-level performance of service instances and make appropriate adjustments, e.g., change segments of routing paths or enable backup paths, according to the SLA requirements.</t>
        </li>
        <li>
          <t>Fault delimiting and troubleshooting: When user experience deteriorates, it is necessary to rapidly locate the fault on the end-to-end path from the user terminal through the network to the service instance to implement fast end-to-end fault location and troubleshooting.</t>
        </li>
      </ul>
    </section>
    <section anchor="Framework">
      <name>CATS OAM Framework</name>
      <section anchor="cats-oam-layering-model">
        <name>CATS OAM Layering Model</name>
        <t>The CATS OAM layering model is shown in Fig. 1. In this architecture,both the CATS router and the underlay node are deployed with the existing OAM technologies.These OAM technologies are used to detect anomalies and monitor service performance in the network domain, and can be divided into three categories: link OAM, tunnel OAM, and service OAM.</t>
        <artwork><![CDATA[
  +------+ +--+--------+    +---+----+   +--------+--+ +--------+
  |client+-+  CATS-    +----+underlay+---+  CATS-    +-+service |
  |      | |Forwarder 1|    |  node  |   |Forwarder 2| |instance|
  +------+ +-----------+    +--------+   +-----------+ +----+---+

           o------------- Service OAM -----------o---------------o

           o------------- Tunnel OAM -----------o

                      o----o      o----o       o----o    Link OAM
                
                Figure 1: CATS OAM Layering Model
]]></artwork>

        <ul spacing="normal">
          <li>
            <t>In link OAM, anomaly detection and performance monitoring are conducted for a single ethernet link. The link layer is an optional sublayer implemented in the data link layer between the Logical Link Control (LLC) and the MAC sublayer in the Open Systems Interconnection (OSI) model. Common detection tools of link OAM include IEEE-802 .3ah.</t>
          </li>
          <li>
            <t>A tunnel bears multiple services so the tunnel OAM must ensure that the performance of a given service is not degraded when the network fails or the number of services in the tunnel increases. As a result, failure detection and performance monitoring are conducted on the LSP layer to implement service protection.Common detection tools of tunnel OAM include ITU-T Y.1711, MPLS-LM-DM, BFD, etc.</t>
          </li>
          <li>
            <t>Service OAM is generally conducted for the L2VPN/L3VPN service layer that is provided by the network to evaluate the service quality and protect services. Common detection tools of service OAM include ITU-T Y.1731, TWAMP, STAMP, etc.</t>
          </li>
        </ul>
        <t>CATS simultaneously steers traffic along network paths and toward compute instances. Within the network domain the three conventional OAM mechanisms remain applicable, yet link-level OAM can at best cover the direct link between compute instances; no effective OAM exists from the ingress/egress gateways to the compute instances themselves. Moreover, the introduction of flow-affinity policies mandates that end-to-end quality assessment of service flows span both network and compute domains.</t>
      </section>
      <section anchor="cats-oam-components">
        <name>CATS OAM Components</name>
        <t>The CATS OAM layering model should flexibly support existing OAM detection tools and it consists of the following three components, SI-OAM, TC-OAM and AF-OAM as Figure 2 shown.</t>
        <artwork><![CDATA[
  +------+ +--+--------+    +---+----+   +--------+--+ +--------+
  |client+-+  CATS-    +----+underlay+---+  CATS-    +-+service |
  |      | |Forwarder 1|    |  node  |   |Forwarder 2| |instance|
  +------+ +-----------+    +--------+   +-----------+ +----+---+
      ^       ^                                   ^         |
      |       |                                   |         |
      |       |                               +---+----+    |
      |       |                               | SI_OAM |<-->|
      |    +--+-----+                         +--------+    |
      |    | TC_OAM |<------------------------------------->|
      |    +--+-----+                                       |
      |       |                                             |
      |    +--+-----+                                       |
      +----+ AF_OAM |<------------------------------------->|
           +--+-----+                                       


              Figure 2: CATS OAM Functional Components
]]></artwork>
        <section anchor="si-oam-component">
          <name>SI-OAM Component</name>
          <t>The functions of this component include (but are not limited to) detecting the failures that happen between the CATS-Forwarder 2 and the service instance, and measuring the associated metrics such as latency, packet loss, and bandwidth.The SI-OAM component generally would not dive into the internal structure of the network between the CATS-Forwarder 2 and the service instance and only makes the measurements of the end-to-end connection. These measurements are generally fed back to the C-SMA component to achieve faster failure detection and performance monitoring than the CATS control plane.</t>
        </section>
        <section anchor="tc-oam-component">
          <name>TC-OAM Component</name>
          <t>The functions of this component include but are not limited to detecting the failures that happen between the CATS-Forwarder 1 and the service instance of a certain specific ID, and measuring the associated metrics such as delay and packet loss. The testing packets are delivered through the CATS Path Selector (C-PS) to the associated service instance according to the corresponding forwarding table entry of the CATS Traffic Classifier (C-TC) to verify whether the measurements of the connection meet the service level agreement (SLA) requirements. And if it does not, recalculation is triggered.</t>
        </section>
        <section anchor="af-oam-component">
          <name>AF-OAM Component</name>
          <t>The functions of this component include but are not limited to measuring the metrics such as delay, packet loss, and bandwidth, of the service flow in CATS. In general, the user experience of an active connection may be affected by a number of factors, such as the processing latency of the service instances may increase or the network performance may degrade due to the increase of the incoming traffic to the service instance. For CATS-Forwarder 1, it is necessary to evaluate whether the SLA requirements of service flows are achieved, and if the SLA requirements are not achieved, conduct appropriate path adjustments to compensate for the deviation as much as possible to ensure the clients have consistent experience. For client terminals, if the experience is degraded, it is necessary to accurately locate where the problem occurs and quickly conduct troubleshooting. It should be noted that related OAM tools can also be developed, so that the entire network stack (L2-L7) can be observed for applications and the entire network stack,instead of merely traditional application-level visibility or network-level visibility, providing a comprehensive solution for operators' efficiency.</t>
        </section>
      </section>
    </section>
    <section anchor="Requirements">
      <name>CATS OAM Requirements</name>
      <section anchor="operation">
        <name>Operation</name>
        <ul spacing="normal">
          <li>
            <t>Sub-second/second-granularity telemetry SHALL be collected for CPU, GPU, memory, accelerator utilization and energy consumption to produce unified compute metrics (e.g., TOPS/W, TFLOPS).</t>
          </li>
          <li>
            <t>These metrics SHALL be fused with network telemetry to generate an integrated “compute-network” telemetry stream encompassing packet loss, latency, throughput and compute load, providing real-time decision inputs to the C-PS.</t>
          </li>
        </ul>
      </section>
      <section anchor="administration">
        <name>Administration</name>
        <ul spacing="normal">
          <li>
            <t>Compute-resource provisioning: A node SHALL present a compute-capability template (type, capacity, affinity) at boot; OAM SHALL authenticate the template and synchronize it to the network-wide routing database.</t>
          </li>
          <li>
            <t>Service contract and billing: OAM SHALL generate a billing model from multi-dimensional factors—compute class, usage duration, network distance—and push the model to edge controllers.</t>
          </li>
          <li>
            <t>Unified orchestration: OAM SHALL abstract compute workloads into routable Compute-SIDs and, together with network SIDs, inject them into the SRv6/BGP SR Policy orchestration plane to enable resource scheduling across domains, clouds, and edges.</t>
          </li>
        </ul>
      </section>
      <section anchor="maintenance">
        <name>Maintenance</name>
        <ul spacing="normal">
          <li>
            <t>End-to-end quality assessment:1）Network segment: Employ BFD, TWAMP and IOAM to detect link/node faults; convergence latency SHALL be ≤ 50 ms.2）Compute segment: Utilize keep-alive plus health probes to monitor container/VM/accelerator liveness; crashes or overload SHALL be detected within seconds.</t>
          </li>
          <li>
            <t>Fault correlation and localization: OAM SHALL correlate “compute unavailable” events with “network-path degradation” events to determine whether the root cause is resource exhaustion or packet loss, eliminating needless path shifts.</t>
          </li>
          <li>
            <t>Intelligent self-healing:  1）Compute-node failure SHALL trigger the CATS Path Selector to re-select a path and move traffic in real time to an alternate node in the same or a remote pool. 2）Network-link failure SHALL invoke TI-LFA/SR-TE protection switching within &lt; 50 ms while simultaneously updating the compute topology to prevent black-holing.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="Deployment">
      <name>Deployment Considerations</name>
      <t>To demonstrate the complete CATS OAM procedure, a proper OAM detection tool needs to be selected and deployed on the network and service instance hosts of the CATS OAM architecture. The selection of OAM detection tools is out of the scope of this document.</t>
    <artwork><![CDATA[                             +-------------------------+
                  +--------------+ Intelligent controller  +-------------+
                  |              +-------------------+-----+             |
                  |                                   |                  |
                  v                                   v                  v
            +-----------+                        +-----------+       +--------+
            |  CATS-    |                        |  CATS-    |       |  Edge  |
            |Forwarder 1|                        |Forwarder 2|       |  Site  |
            |           |                        |           |Service|        |
+--------+  |+---------+|                        |+---------+|Metrics|S-ID 1  |
| client |  ||  C-PS   ||       +--------+       ||  C-SMA  |<-------|SI-ID 1 |
|        |  |+---------+|Network|        |Network|+---------+|       |        |
|+------+|  |  ^    ^   |Metrics|Underlay|Metrics|       ^   |       |S-ID 1  |
||AF-OAM|+--+  |    |   |<------+ domain |<------|       |   |-------|SI-ID 2 |
|+--+---+|  |  |    |   |       +--------+       |   +---+--+| OWAMP |        |
|   |    |  |  |    |   |                        |   |SI-OAM|<------>|S-ID 2  |
+---+----+  |  |+---+--+|           OWAMP        |   +------+|       |SI-ID 1 |
    |       |  ||TC-OAM|+------------------------+-----------+------>|        |
    |       |  |+------+|                        |           |       |S-ID 2  |
    |       | ++-------+|           IOAM         |           |       |SI-ID 2 |
    |       | | AF-OAM |+------------------------+-----------+------>|        |
    |       | +--------+|           IOAM         |           |       |        |
    +-------+-----------+------------------------+-----------+------>|        |
            +-----------+                        +-----------+       +--------+

             Figure 3: An Example Of CATS OAM Deployment
]]></artwork>
      <t>As illustrated in Fig. 3, the OWAMP and the IOAM tools are selected as examples to describe how the CATS OAM component works with these detection tools to fulfill the four objectives :</t>
      <ul spacing="normal">
        <li>
          <t>Convergence latency is compressed from the order of tens of seconds to sub-second timescale: The SI-OAM component is deployed on the CATS-Forwarder 2 and the OWAMP tool  is used to measure the delay and packet loss from the CATS-Forwarder 2 to the associated service instance. The source and
the destination IP of the detection packets are the CATS-Forwarder 2 interface IP and the service instance IP, respectively.According to the returned packets, the status and the metrics of both the service instance and the network that connects the service instance with the clients are obtained. The SI-OAM component feeds back the measurement results to the C-SMA component, which further spreads the computing resource information in the CATS network to accelerate CATS Path Selector(C-PS) convergence to avoid black holes.</t>
        </li>
        <li>
          <t>Closed-loop network SLA guarantee: The TC-OAM component is deployed on the CATS-Forwarder 1 and the OWAMP tool is used to measure the delay and packet loss from the CATS-Forwarder 1 to the associated service instance. To ensure OWAMP packets are
delivered according to the table item of TC, the source and the destination IP addresses of the detection packets are set to the IP address of the interface of CATS-Forwarder 1 and the IP address corresponding to the service ID, respectively. OWAMP packets usually pass through the tunnel to the egress network and are forwarded to the service instance. According to the returned OWAMP packets, the TC-OAM obtains the measurement results and feeds back the results to the C-PS component. If the measurement results deviate from the expected SLAs, recalculation is triggered to fulfill the closed-loop network SLA guarantee for the service ID.</t>
        </li>
        <li>
          <t>Closed-loop SLA guarantee for service flow: for service flows that have been initiated, the flow affinity function is executed to guarantee that subsequent packets reach the same service instance as the first packet. To conduct measuring and performance monitoring for the entire end-to-end flows, the flow-based detection tool such as IOAM is selected and the AF-OAM component is deployed on the CATS-Forwarder 1. Note that the PostCard or the PassPort modes are generally used in the flow-based detection and a centralized collector is required to obtain the measurement results and feed the results back to the C-PS. The network path
can be adjusted according to the difference between the OAM measurement results and the SLA requirements to ensure a consistent user experience.</t>
        </li>
        <li>
          <t>Service fault delimiting and troubleshooting: For fast delimitation and troubleshooting under user experience degradation, the AF-OAM component can be deployed on a user terminal when a flow detection tool such as IOAM is performed.The IOAM can use the postcard mode and can directly report the location where packet loss or longer delay occurs according to the measurement results obtained by a centralized collector. This is a typical scenario of IOAM, and details are not described herein.</t>
        </li>
      </ul>
      <t>For different detection targets, flexible choices of detection protocols and mechanisms can be made, which will not be elaborated upon here.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>To be discussed in future versions of this document.</t>
    </section>

    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>To be added upon contributions, comments and suggestions.</t>
    </section>

    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    


  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC4656">
          <front>
            <title>A One-way Active Measurement Protocol (OWAMP)</title>
            <author fullname="S. Shalunov" initials="S." surname="Shalunov"/>
            <author fullname="B. Teitelbaum" initials="B." surname="Teitelbaum"/>
            <author fullname="A. Karp" initials="A." surname="Karp"/>
            <author fullname="J. Boote" initials="J." surname="Boote"/>
            <author fullname="M. Zekauskas" initials="M." surname="Zekauskas"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>The One-Way Active Measurement Protocol (OWAMP) measures unidirectional characteristics such as one-way delay and one-way loss. High-precision measurement of these one-way IP performance metrics became possible with wider availability of good time sources (such as GPS and CDMA). OWAMP enables the interoperability of these measurements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4656"/>
          <seriesInfo name="DOI" value="10.17487/RFC4656"/>
        </reference>
        <reference anchor="I-D.ldbc-cats-framework">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zongpeng Du" initials="Z." surname="Du">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <date day="8" month="February" year="2024"/>
            <abstract>
              <t>   This document describes a framework for Computing-Aware Traffic
   Steering (CATS).  Particularly, the document identifies a set of CATS
   components, describes their interactions, and exemplifies the
   workflow of the control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ldbc-cats-framework-06"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-cats-usecases-requirements">
          <front>
            <title>Computing-Aware Traffic Steering (CATS) Problem Statement, Use Cases, and Requirements</title>
            <author fullname="Kehan Yao" initials="K." surname="Yao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Hang Shi" initials="H." surname="Shi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Shuai Zhang" initials="S." surname="Zhang">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Qing An" initials="Q." surname="An">
              <organization>Alibaba Group</organization>
            </author>
            <date day="10" month="June" year="2025"/>
            <abstract>
              <t>   Distributed computing is a computing pattern that service providers
   can follow and use to achieve better service response time and
   optimized energy consumption.  In such a distributed computing
   environment, compute intensive and delay sensitive services can be
   improved by utilizing computing resources hosted in various computing
   facilities.  Ideally, compute services are balanced across servers
   and network resources to enable higher throughput and lower response
   time.  To achieve this, the choice of server and network resources
   should consider metrics that are oriented towards compute
   capabilities and resources instead of simply dispatching the service
   requests in a static way or optimizing solely on connectivity
   metrics.  The process of selecting servers or service instance
   locations, and of directing traffic to them on chosen network
   resources is called "Computing-Aware Traffic Steering" (CATS).

   This document provides the problem statement and the typical
   scenarios for CATS, which shows the necessity of considering more
   factors when steering traffic to the appropriate computing resource
   to better meet the customer's expectations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cats-usecases-requirements-07"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc3272bis">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <date day="12" month="August" year="2023"/>
            <abstract>
              <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-27"/>
        </reference>
      </references>
    </references>
    <?line 251?>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
    <contact initials="D." surname="Huang" fullname="Daniel Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <email>huang.guangping@zte.com.cn</email>
      </address>
    </contact>
    <contact initials="C." surname="Huang" fullname="Cheng Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <email>huang.cheng13@zte.com.cn</email>
      </address>
    </contact>
    <contact initials="W." surname="Duan" fullname="Wei Duan">
      <organization>ZTE Corporation</organization>
      <address>
        <email>duan.wei1@zte.com.cn</email>
      </address>
    </contact>   

    </section>

  </back>
  <!-- ##markdown-source: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-->

</rfc>
