<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-mpls-mna-usecases-00" category="info">

  <front>
    <title abbrev="MNA Usecases">Use Cases for MPLS Network Action Indicators and MPLS Ancillary Data</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Juniper Networks</organization>
      <address>
        <email>tsaad@juniper.net</email>
      </address>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization>Futurewei Technologies</organization>
      <address>
        <email>kiranm@futurewei.com</email>
      </address>
    </author>
    <author initials="H." surname="Song" fullname="Haoyu Song">
      <organization>Futurewei Technologies</organization>
      <address>
        <email>haoyu.song@futurewei.com</email>
      </address>
    </author>
    <author initials="G." surname="Mirsky" fullname="Greg Mirsky">
      <organization>Ericsson</organization>
      <address>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="May" day="19"/>

    
    <workgroup>MPLS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document presents a number of use cases that have a common need for
encoding network action indicators and associated ancillary data inside MPLS packets.
There has been significant recent interest in extending the MPLS data plane to
carry such indicators and ancillary data to address a number of use cases that
are described in this document.</t>

<t>The use cases described in this document are not an exhaustive set, but rather
the ones that are actively discussed by members of the IETF MPLS, PALS and
DETNET working groups participating in the MPLS Open Design Team.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes important cases that require carrying additional
ancillary data within the MPLS packets, as well as means to indicate the
ancillary data is present, and a specific action needs to be performed on the
packet.</t>

<t>These use cases have been identified by the MPLS Working Group Open Design Team
working on defining MPLS Network Actions for the MPLS data plane. The MPLS
Ancillary Data (AD) can be classified as:</t>

<t><list style="symbols">
  <t>implicit, or “no-data” associated with a Network Action (NA) indicator,</t>
  <t>residing within the MPLS label stack and referred to as In Stack Data (ISD), and</t>
  <t>residing after the Bottom of MPLS label Stack (BoS) and referred to as Post Stack Data (PSD).</t>
</list></t>

<t>The use cases described in this document will be used to assist in
identifying requirements and issues to be considered for future resolution by
the working group.</t>

<section anchor="terminology" title="Terminology">

<t>The following terminology is used in the document:</t>

<t><list style="hanging">
  <t hangText="IETF Network Slice:"><vspace blankLines='0'/>
  a well-defined composite of a set of
endpoints, the connectivity requirements between subsets of these
endpoints, and associated requirements; the term ‘network slice’
in this document refers to ‘IETF network slice’ as defined in 
<xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>
  <t hangText="Time-Bound Networking:"><vspace blankLines='0'/>
  Networks that transport time-bounded traffic.</t>
</list></t>

</section>
<section anchor="acronyms-and-abbreviations" title="Acronyms and Abbreviations">

<t><list style='empty'>
  <t>ISD: In-stack data</t>
</list></t>

<t><list style='empty'>
  <t>PSD: Post-stack data</t>
</list></t>

<t><list style='empty'>
  <t>MNA: MPLS Network Action</t>
</list></t>

<t><list style='empty'>
  <t>NAI: Network Action Indicator</t>
</list></t>

<t><list style='empty'>
  <t>AD: Ancillary Data</t>
</list></t>

</section>
</section>
<section anchor="use-cases" title="Use Cases">

<section anchor="no-further-fastreroute" title="No Further Fastreroute">

<t>MPLS Fast Reroute (FRR) <xref target="RFC4090"/>, <xref target="RFC5286"/> and <xref target="RFC7490"/> is a useful
and widely deployed tool for minimizing packet loss in the case of a link or
node failure.</t>

<t>Several cases exist where, once FRR has taken place in an MPLS network and
resulted in rerouting a packet away from the failure, a second FRR that impacts
the same packet to rerouting  is not helpful, and may even be disruptive.</t>

<t>For example, in such a case, the packet may continue to loop until its TTL
expires.  This can lead to link congestion and further packet loss.  Thus, the
attempt to prevent a packet from being dropped may instead affect many other
packets. A proposal to address this is presented in
<xref target="I-D.kompella-mpls-nffrr"/>.</t>

</section>
<section anchor="in-situ-oam" title="In-situ OAM">

<t>In-situ Operations, Administration, and Maintenance (IOAM) may record operational
and telemetry information within the packet while the packet traverses a
particular path in a network domain.</t>

<t>The term “in-situ” refers to the fact that the IOAM data fields are added to
the data packets rather than being sent within the probe packets specifically
dedicated to OAM or Performance Measurement (PM).</t>

<t>IOAM can run in two modes Edge-to-Edge (E2E) and Hop-by-Hop (HbH).  In E2E mode,
only the encapsulating and decapsulating nodes will process IOAM data fields.
In HbH mode, the encapsulating and decapsulating nodes as well as intermediate
IOAM-capable nodes process IOAM data fields.</t>

<t>The IOAM data fields are defined in <xref target="I-D.ietf-ippm-ioam-data"/>, and can be
used for various use-cases of OAM and PM.</t>

<t><xref target="I-D.gandhi-mpls-ioam-sr"/> defines how IOAM data fields are transported using
the MPLS data plane encapsulations, including Segment Routing (SR) with MPLS
data plane (SR-MPLS).</t>

<t>The IOAM data may be added after the bottom of the MPLS label stack. The IOAM
data fields can be of fixed or incremental size as defined in
<xref target="I-D.ietf-ippm-ioam-data"/>.  <xref target="I-D.gandhi-mpls-ioam"/> describes the
applicability of IOAM to MPLS dataplane.  The encapsulating MPLS node needs to
know if the decapsulating MPLS node can process the IOAM data before adding it
in the packet. In HbH IOAM mode, nodes that are capable of processing IOAM will
intercept and process the IOAM data accordingly. The presence of IOAM header and optional IOAM 
data will betransparent to nodes that do not support or do not participate in the IOAM
process.</t>

</section>
<section anchor="network-slicing" title="Network Slicing">

<t><xref target="I-D.ietf-teas-ietf-network-slices"/> specifies the definition of 
an IETF Network Slice. It further discusses the general framework for
requesting and operating IETF Network Slices, their characteristics, and the
necessary system components and interfaces.</t>

<t>Multiple network slices can be realized on top of a single physical network.</t>

<t>In order to overcome scale challenges, IETF Network Slices may be aggregated
into groups according to similar characteristics.  The slice aggregate
<xref target="I-D.bestbar-teas-ns-packet"/> is a construct that comprises of the traffic
flows of one or more IETF Network Slices of similar characteristics.</t>

<t>A router that requires forwarding of a packet that belongs to a slice aggregate
may have to decide on the forwarding action to take based on selected
next-hop(s), and the forwarding treatment (e.g., scheduling and drop policy) to
enforce based on the associated  per-hop behavior.</t>

<t>The routers in the network that forward traffic over links that are shared by
multiple slice aggregates need to identify the slice aggregate packets
in order to enforce the associated forwarding action and treatment.</t>

<t>An IETF network slice MAY support the following key features:</t>

<t><list style="numbers">
  <t>A Slice Selector</t>
  <t>A Network Resource Partition associated with a slice aggregate.</t>
  <t>A Path selection criteria</t>
  <t>Verification that per slice Slice Level Objectives (SLOs) are being met. This may be done by active measurements
(inferred) or by using hybrid measurement methods, e.g., IOAM.</t>
  <t>Additionally, there is an on-going discussion on using Service Functions
(SFs) with network slices. This may require insertion of an NSH.</t>
  <t>For multi-domain scenarios, a packet that traverses multiple domains may
encode different identifiers within each domain.</t>
</list></t>

<section anchor="global-identifier-as-flow-aggregate-selector" title="Global Identifier as Flow-Aggregate Selector">

<t>A Global Identifier as a Flow-Aggregate Selector (G-FAS) can be encoded in the
MPLS packet as defined in <xref target="I-D.kompella-mpls-mspl4fa"/>,
<xref target="I-D.li-mpls-enhanced-vpn-vtn-id"/>, and
<xref target="I-D.decraene-mpls-slid-encoded-entropy-label-id"/>.  The G-FAS is used to
associate the packets belonging to Slice-Flow Aggregate to the underlying
Network Resource Partition (NRP) as described in
<xref target="I-D.bestbar-teas-ns-packet"/>.</t>

<t>The G-FAS can be encoded within an MPLS label carried in the packet’s MPLS label
stack. All packets that belong to the same flow aggregate MAY carry the same FAS in
the MPLS label stack.</t>

<t>When MPLS packets carry a G-FAS, MPLS LSRs use the forwarding label to select the forwarding
next-hop(s), and use the G-FAS in the MPLS packet to infer the
specific forwarding treatment that needs to be applied on the packet.</t>

</section>
<section anchor="forwarding-label-as-a-flow-aggregate-selector" title="Forwarding Label as a Flow-Aggregate Selector">

<t><xref target="RFC3031"/> states in Section 2.1 that: ‘Some routers analyze a packet’s
network layer header not merely to choose the packet’s next hop, but also to
determine a packet’s “precedence” or “class of service”’.</t>

<t>It is possible by assigning a unique MPLS forwarding label to each flow
aggregate (FEC) to distinguish the packets forwarded to the same destination.
from other flow aggregates.  In this case, LSRs can use the
top forwarding label to infer both the forwarding action and the forwarding
treatment to be invoked on the packets.</t>

</section>
</section>
<section anchor="delay-budgets-for-time-bound-applications" title="Delay Budgets for Time-Bound Applications">

<t>The routers in a network can perform two distinct functions on incoming
packets, namely forwarding (where the packet should be sent) and scheduling
(when the packet should be sent). IEEE-802.1 Time Sensitive Networking (TSN) and
Deterministic Networking provide several mechanisms for scheduling under the
assumption that routers are time-synchronized.  The most effective mechanisms
for delay minimization involve per-flow resource allocation.</t>

<t>Segment Routing (SR) is a forwarding paradigm that allows encoding forwarding
instructions in the packet in a stack data structure, rather than being
programmed into the routers.  The SR instructions are contained within a packet
in the form of a First-in First-out stack dictating the forwarding decisions of
successive routers.  Segment routing may be used to choose a path sufficiently
short to be capable of providing a bounded end-to-end latency but does
not influence the queueing of individual packets in each router along that path.</t>

<t>When carried over the MPLS data plane, a solution is required to enable the
delivery of such packets that can be delivered to their final destination by a
given time budget.</t>

<section anchor="stack-based-methods-for-latency-control" title="Stack Based Methods for Latency Control">

<t>One efficient data structure for inserting local deadlines into
the headers is a “stack”, similar to that used in Segment Routing to
carry forwarding instructions.  The number of deadline values in the
stack equals the number of routers the packet needs to traverse in
the network, and each deadline value corresponds to a specific
router.  The Top-of-Stack (ToS) corresponds to the first router’s
deadline while the Bottom-of-Stack (BoS) refers to the last’s.  All
local deadlines in the stack are later or equal to the current time
(upon which all routers agree), and times closer to the ToS are
always earlier or equal to times closer to the BoS.</t>

<t>The ingress router inserts the deadline stack into the packet headers; no other
router needs to be aware of the requirements of the time-bound flows.
Hence admitting a new flow only requires updating the information base of the
ingress router.</t>

<t>MPLS LSRs that expose the Top of Stack (ToS) label can also inspect the
associated “deadline” carried in the packet (either in MPLS stack as ISD or
after BoS as PSD).</t>

</section>
</section>
<section anchor="nsh-based-service-function-chaining" title="NSH-based Service Function Chaining">

<t><xref target="RFC8595"/> describes how Service Function Chaining (SFC) can be realized in
an MPLS network by emulating the NSH by using only MPLS label stack elements.</t>

<t>The approach in <xref target="RFC8595"/> introduces some limitations that are discussed in
<xref target="I-D.lm-mpls-sfc-path-verification"/>. This approach, however, can benefit
from the framework introduced with MNA <xref target="I-D.andersson-mpls-mna-fwk"/>.</t>

<t>For example, it may be possible to extend NSH emulation using MPLS
labels <xref target="RFC8595"></xref> to support the functionality of NSH Context Headers,
whether fixed or variable-length. One of the use cases could support Flow ID
<xref target="I-D.ietf-sfc-nsh-tlv"/> that may be used for load-balancing among
Service Function Forwarders (SFFs) and/or the Service Function (SF)
within the same SFP.</t>

</section>
<section anchor="network-programming" title="Network Programming">

<t>In SR, an ingress node steers a packet through an ordered list of instructions,
called “segments”.  Each one of these instructions represents a
function to be called at a specific location in the network.  A
function is locally defined on the node where it is executed and may
range from simply moving forward in the segment list to any complex
user-defined behavior.</t>

<t>Network Programming combines Segment Routing (SR) functions to achieve a
networking objective that goes beyond mere packet routing.</t>

<t>It may be desirable to encode a pointer to function and its arguments
within an MPLS packet transport header. For example, in MPLS we can encode the
FUNC::ARGs within the label stack or after the Bottom of Stack to support the
equivalent of FUNC::ARG in SRv6 as described in <xref target="RFC8986"/>.</t>

</section>
<section anchor="application-aware-networking" title="Application Aware Networking">

<t>Application-aware Networking (APN) as described in
<xref target="I-D.li-apn-problem-statement-usecases"/> allows application-aware information
(i.e., APN attributes) including APN identification (ID) and/or APN parameters
(e.g.  network performance requirements) to be encapsulated at network edge
devices and carried in packets traversing an APN domain.</t>

<t>The APN data is carried in packets to facilitate service provisioning, and be
used to perform fine-granularity traffic steering and network resource
adjustment. To support APN in MPLS networks, mechanisms are needed to carry
such APN data in MPLS encapsulated packets.</t>

</section>
</section>
<section anchor="co-existence-of-usecases" title="Co-existence of Usecases">

<t>Two or more of the aforementioned use cases MAY co-exist in the same packet.
This may require the presence of multiple ancilary data
(whether In-stack or Post-stack ancillary data) to be present in the same MPLS packet.</t>

<t>For example, IOAM may provide key functions along with network slicing to help
ensure that critical network slice SLOs are being met by the network provider.
In this case, IOAM is able to collect key performance measurement parameters of
network slice traffic flows as it traverses the transport network.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no IANA actions.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This document introduces no new security considerations.</t>

</section>
<section anchor="acknowledgement" title="Acknowledgement">

<t>The authors gratefully acknowledge the input of the members of the
MPLS Open Design Team.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The following individuals contributed to this document:</t>

<figure><artwork><![CDATA[
   Loa Andersson
   Bronze Dragon Consulting
   Email: loa@pi.nu

]]></artwork></figure>

</section>


  </middle>

  <back>


    <references title='Informative References'>




<reference anchor='I-D.ietf-teas-ietf-network-slices'>
   <front>
      <title>Framework for IETF Network Slices</title>
      <author fullname='Adrian Farrel'>
	 <organization>Old Dog Consulting</organization>
      </author>
      <author fullname='John Drake'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Reza Rokui'>
	 <organization>Ciena</organization>
      </author>
      <author fullname='Shunsuke Homma'>
	 <organization>NTT</organization>
      </author>
      <author fullname='Kiran Makhijani'>
	 <organization>Futurewei</organization>
      </author>
      <author fullname='Luis M. Contreras'>
	 <organization>Telefonica</organization>
      </author>
      <author fullname='Jeff Tantsura'>
	 <organization>Microsoft Inc.</organization>
      </author>
      <date day='27' month='March' year='2022'/>
      <abstract>
	 <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term &quot;IETF Network
   Slice&quot; and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slices-10'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-teas-ietf-network-slices-10.txt' type='TXT'/>
</reference>



<reference anchor='RFC4090' target='https://www.rfc-editor.org/info/rfc4090'>
<front>
<title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
<author fullname='P. Pan' initials='P.' role='editor' surname='Pan'><organization/></author>
<author fullname='G. Swallow' initials='G.' role='editor' surname='Swallow'><organization/></author>
<author fullname='A. Atlas' initials='A.' role='editor' surname='Atlas'><organization/></author>
<date month='May' year='2005'/>
<abstract><t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels.  These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t><t>Two methods are defined here.  The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair.  The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints.  Both methods can be used to protect links and nodes during network failure.  The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4090'/>
<seriesInfo name='DOI' value='10.17487/RFC4090'/>
</reference>



<reference anchor='RFC5286' target='https://www.rfc-editor.org/info/rfc5286'>
<front>
<title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
<author fullname='A. Atlas' initials='A.' role='editor' surname='Atlas'><organization/></author>
<author fullname='A. Zinin' initials='A.' role='editor' surname='Zinin'><organization/></author>
<date month='September' year='2008'/>
<abstract><t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG).  The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure.  Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5286'/>
<seriesInfo name='DOI' value='10.17487/RFC5286'/>
</reference>



<reference anchor='RFC7490' target='https://www.rfc-editor.org/info/rfc7490'>
<front>
<title>Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)</title>
<author fullname='S. Bryant' initials='S.' surname='Bryant'><organization/></author>
<author fullname='C. Filsfils' initials='C.' surname='Filsfils'><organization/></author>
<author fullname='S. Previdi' initials='S.' surname='Previdi'><organization/></author>
<author fullname='M. Shand' initials='M.' surname='Shand'><organization/></author>
<author fullname='N. So' initials='N.' surname='So'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document describes an extension to the basic IP fast reroute mechanism, described in RFC 5286, that provides additional backup connectivity for point-to-point link failures when none can be provided by the basic mechanisms.</t></abstract>
</front>
<seriesInfo name='RFC' value='7490'/>
<seriesInfo name='DOI' value='10.17487/RFC7490'/>
</reference>


<reference anchor='I-D.kompella-mpls-nffrr'>
   <front>
      <title>No Further Fast Reroute</title>
      <author fullname='Kireeti Kompella'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Wen Lin'>
	 <organization>Juniper Networks</organization>
      </author>
      <date day='12' month='July' year='2021'/>
      <abstract>
	 <t>   There are several cases where, once Fast Reroute has taken place (for
   MPLS protection), a second fast reroute is undesirable, even
   detrimental.  This memo gives several examples of this, and proposes
   a mechanism to prevent further fast reroutes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kompella-mpls-nffrr-02'/>
   <format target='https://www.ietf.org/archive/id/draft-kompella-mpls-nffrr-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-ippm-ioam-data'>
   <front>
      <title>Data Fields for In-situ OAM</title>
      <author fullname='Frank Brockners'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Shwetha Bhandari'>
	 <organization>Thoughtspot</organization>
      </author>
      <author fullname='Tal Mizrahi'>
	 <organization>Huawei</organization>
      </author>
      <date day='13' month='December' year='2021'/>
      <abstract>
	 <t>   In-situ Operations, Administration, and Maintenance (IOAM) records
   operational and telemetry information in the packet while the packet
   traverses a path in the network.  This document discusses the data
   fields and associated data types for in-situ OAM.  In-situ OAM data
   fields can be encapsulated into a variety of protocols such as NSH,
   Segment Routing, Geneve, or IPv6.  In-situ OAM can be used to
   complement OAM mechanisms based on, e.g., ICMP or other types of
   probe packets.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ippm-ioam-data-17'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ippm-ioam-data-17.txt' type='TXT'/>
</reference>


<reference anchor='I-D.gandhi-mpls-ioam-sr'>
   <front>
      <title>MPLS Data Plane Encapsulation for In-situ OAM Data</title>
      <author fullname='Rakesh Gandhi'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Zafar Ali'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Frank Brockners'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Voitek Kozak'>
	 <organization>Comcast</organization>
      </author>
      <date day='18' month='February' year='2021'/>
      <abstract>
	 <t>   In-situ Operations, Administration, and Maintenance (IOAM) records
   operational and telemetry information in the data packet while the
   packet traverses a path between two nodes in the network.  This
   document defines how IOAM data fields are transported with MPLS data
   plane encapsulation using new Generic Associated Channel (G-ACh).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-gandhi-mpls-ioam-sr-06'/>
   <format target='https://www.ietf.org/archive/id/draft-gandhi-mpls-ioam-sr-06.txt' type='TXT'/>
</reference>


<reference anchor='I-D.gandhi-mpls-ioam'>
   <front>
      <title>MPLS Data Plane Encapsulation for In-situ OAM Data</title>
      <author fullname='Rakesh Gandhi'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Zafar Ali'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Frank Brockners'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Bruno Decraene'>
	 <organization>Orange</organization>
      </author>
      <author fullname='Voitek Kozak'>
	 <organization>Comcast</organization>
      </author>
      <date day='2' month='March' year='2022'/>
      <abstract>
	 <t>   In-situ Operations, Administration, and Maintenance (IOAM) is used
   for recording and collecting operational and telemetry information
   while the packet traverses a path between two points in the network.
   This document defines how IOAM data fields are transported with MPLS
   data plane encapsulation using new Generic Associated Channel (G-ACh)
   and updates the RFC 5586.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-gandhi-mpls-ioam-04'/>
   <format target='https://www.ietf.org/archive/id/draft-gandhi-mpls-ioam-04.txt' type='TXT'/>
</reference>


<reference anchor='I-D.bestbar-teas-ns-packet'>
   <front>
      <title>Realizing Network Slices in IP/MPLS Networks</title>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Jie Dong'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Daniele Ceccarelli'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Joel Halpern'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Ran Chen'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Xufeng Liu'>
	 <organization>Volta Networks</organization>
      </author>
      <author fullname='Luis M. Contreras'>
	 <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui'>
	 <organization>Ciena</organization>
      </author>
      <author fullname='Luay Jalil'>
	 <organization>Verizon</organization>
      </author>
      <date day='5' month='May' year='2022'/>
      <abstract>
	 <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-teas-ns-packet-10'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-teas-ns-packet-10.txt' type='TXT'/>
</reference>


<reference anchor='I-D.kompella-mpls-mspl4fa'>
   <front>
      <title>Multi-purpose Special Purpose Label for Forwarding Actions</title>
      <author fullname='Kireeti Kompella'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Israel Meilik'>
	 <organization>Broadcom</organization>
      </author>
      <date day='9' month='February' year='2022'/>
      <abstract>
	 <t>   The MPLS architecture introduced Special Purpose Labels (SPLs) to
   indicate special forwarding actions and offered a few simple
   examples, such as Router Alert.  In the two decades since the
   original architecture was crafted, the range, complexity and sheer
   number of such actions has grown; in addition, there now is need for
   &quot;associated data&quot; for some of the forwarding actions.  Likewise, the
   capabilities and scale of forwarding engines has also improved vastly
   over the same time period.  There is a pressing need to match the
   needs with the capabilities to deliver the next generation of MPLS
   architecture.

   In this memo, we propose an alternate mechanism whereby a single SPL
   can encode multiple forwarding actions and carry associated data,
   some in the label stack and some after the label stack.  This
   proposal also solves the problem of scarcity of base SPLs.

   This approach can immediately address several use cases:

   *  to carry a Slice Selector for IETF network slicing;

   *  to signal that further fast reroute may have harmful consequences;

   *  to indicate that there is relevant data after the label stack;

   *  among others.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kompella-mpls-mspl4fa-02'/>
   <format target='https://www.ietf.org/archive/id/draft-kompella-mpls-mspl4fa-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.li-mpls-enhanced-vpn-vtn-id'>
   <front>
      <title>Carrying Virtual Transport Network Identifier in MPLS Packet</title>
      <author fullname='Zhenbin Li'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Jie Dong'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   A Virtual Transport Network (VTN) is a virtual network which has a
   customized network topology and a set of dedicated or shared network
   resources allocated from the underlying network infrastructure.
   Multiple VTNs can be created by network operator for using as the
   underlay for one or a group of VPNs services to provide enhanced VPN
   (VPN+) services.  In packet forwarding, some fields in the data
   packet needs to be used to identify the VTN the packet belongs to, so
   that the VTN-specific processing can be executed.  In the context of
   network slicing, a VTN can be instantiated as a Network Resource
   Partition (NRP).

   This document proposes a mechanism to carry the VTN-ID in an MPLS
   packet to identify the VTN the packet belongs to.  The procedure for
   processing the VTN ID is also specified.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-li-mpls-enhanced-vpn-vtn-id-02'/>
   <format target='https://www.ietf.org/archive/id/draft-li-mpls-enhanced-vpn-vtn-id-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.decraene-mpls-slid-encoded-entropy-label-id'>
   <front>
      <title>Using Entropy Label for Network Slice Identification in MPLS networks.</title>
      <author fullname='Bruno Decraene'>
	 <organization>Orange</organization>
      </author>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Wim Henderickx'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Luay Jalil'>
	 <organization>Verizon</organization>
      </author>
      <date day='11' month='February' year='2022'/>
      <abstract>
	 <t>   This document defines a solution to encode a slice identifier in MPLS
   in order to distinguish packets that belong to different slices, to
   allow enforcing per network slice policies (.e.g, Qos).

   The slice identification is independent of the topology.  It allows
   for QoS/DiffServ policy on a per slice basis in addition to the per
   packet QoS/DiffServ policy provided by the MPLS Traffic Class field.

   In order to minimize the size of the MPLS stack and to ease
   incremental deployment the slice identifier is encoded as part of the
   Entropy Label.

   This document also extends the use of the TTL field of the Entropy
   Label in order to provide a flexible set of flags called the Entropy
   Label Control field.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-decraene-mpls-slid-encoded-entropy-label-id-03'/>
   <format target='https://www.ietf.org/archive/id/draft-decraene-mpls-slid-encoded-entropy-label-id-03.txt' type='TXT'/>
</reference>



<reference anchor='RFC3031' target='https://www.rfc-editor.org/info/rfc3031'>
<front>
<title>Multiprotocol Label Switching Architecture</title>
<author fullname='E. Rosen' initials='E.' surname='Rosen'><organization/></author>
<author fullname='A. Viswanathan' initials='A.' surname='Viswanathan'><organization/></author>
<author fullname='R. Callon' initials='R.' surname='Callon'><organization/></author>
<date month='January' year='2001'/>
<abstract><t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3031'/>
<seriesInfo name='DOI' value='10.17487/RFC3031'/>
</reference>



<reference anchor='RFC8595' target='https://www.rfc-editor.org/info/rfc8595'>
<front>
<title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
<author fullname='A. Farrel' initials='A.' surname='Farrel'><organization/></author>
<author fullname='S. Bryant' initials='S.' surname='Bryant'><organization/></author>
<author fullname='J. Drake' initials='J.' surname='Drake'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack.  That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack.  This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='8595'/>
<seriesInfo name='DOI' value='10.17487/RFC8595'/>
</reference>


<reference anchor='I-D.lm-mpls-sfc-path-verification'>
   <front>
      <title>MPLS-based Service Function Path(SFP) Consistency Verification</title>
      <author fullname='Liu Yao'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Greg Mirsky'>
	 <organization>ZTE Corporation</organization>
      </author>
      <date day='21' month='February' year='2021'/>
      <abstract>
	 <t>   This document describes extensions to MPLS LSP ping mechanisms to
   support verification between the control/management plane and the
   data plane state for SR-MPLS service programming and MPLS-based NSH
   SFC.

   This document defines the signaling of the Generic Associated Channel
   (G-ACh) over a Service Function Path (SFP) with an MPLS forwarding
   plane using the basic unit defined in RFC 8595.  The document updates
   RFC 8595 in respect to SFF&#39;s handiling TTL expiration.  The document
   also describes the processing of the G-ACh by the elements of the
   SFP.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-lm-mpls-sfc-path-verification-02'/>
   <format target='https://www.ietf.org/archive/id/draft-lm-mpls-sfc-path-verification-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.andersson-mpls-mna-fwk'>
   <front>
      <title>MPLS Network Actions Framework</title>
      <author fullname='Loa Andersson'>
	 <organization>Bronze Dragon Consulting</organization>
      </author>
      <author fullname='Stewart Bryant'>
	 <organization>University of Surrey 5GIC</organization>
      </author>
      <author fullname='Matthew Bocci'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Tony Li'>
	 <organization>Juniper Networks</organization>
      </author>
      <date day='27' month='April' year='2022'/>
      <abstract>
	 <t>   This document specifies an architectural framework for the MPLS
   Network Actions (MNA) technologies.  MNA technologies are used to
   indicate actions for Label Switched Paths (LSPs) and/or packets and
   to transfer data needed for these actions.

   The document describes a common set of protocol actions and
   information elements supporting additional operational models and
   capabilities of MPLS networks.  Some of these actions are defined in
   existing MPLS specifications, while others require extensions to
   existing specifications to meet the requirements found in
   &quot;Requirements for MPLS Label Stack Indicators and Ancillary Data&quot;.

   This document is the result of work started in MPLS Open Desgign
   Team, with participation by the MPLS, PALS and DETNET working groups.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-andersson-mpls-mna-fwk-01'/>
   <format target='https://www.ietf.org/archive/id/draft-andersson-mpls-mna-fwk-01.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-sfc-nsh-tlv'>
   <front>
      <title>Network Service Header (NSH) Metadata Type 2 Variable-Length Context Headers</title>
      <author fullname='Yuehua Wei'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Uri Elzur'>
	 <organization>Intel</organization>
      </author>
      <author fullname='Sumandra Majee'>
	 <organization>Individual contributor</organization>
      </author>
      <author fullname='Carlos Pignataro'>
	 <organization>Cisco</organization>
      </author>
      <author fullname='Donald E. Eastlake'>
	 <organization>Futurewei Technologies</organization>
      </author>
      <date day='20' month='April' year='2022'/>
      <abstract>
	 <t>   Service Function Chaining (SFC) uses the Network Service Header (NSH)
   (RFC 8300) to steer and provide context Metadata (MD) with each
   packet.  Such Metadata can be of various Types including MD Type 2
   consisting of variable length context headers.  This document
   specifies several such context headers that can be used within a
   service function path.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sfc-nsh-tlv-15'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-sfc-nsh-tlv-15.txt' type='TXT'/>
</reference>



<reference anchor='RFC8986' target='https://www.rfc-editor.org/info/rfc8986'>
<front>
<title>Segment Routing over IPv6 (SRv6) Network Programming</title>
<author fullname='C. Filsfils' initials='C.' role='editor' surname='Filsfils'><organization/></author>
<author fullname='P. Camarillo' initials='P.' role='editor' surname='Camarillo'><organization/></author>
<author fullname='J. Leddy' initials='J.' surname='Leddy'><organization/></author>
<author fullname='D. Voyer' initials='D.' surname='Voyer'><organization/></author>
<author fullname='S. Matsushima' initials='S.' surname='Matsushima'><organization/></author>
<author fullname='Z. Li' initials='Z.' surname='Li'><organization/></author>
<date month='February' year='2021'/>
<abstract><t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t><t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t><t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t></abstract>
</front>
<seriesInfo name='RFC' value='8986'/>
<seriesInfo name='DOI' value='10.17487/RFC8986'/>
</reference>


<reference anchor='I-D.li-apn-problem-statement-usecases'>
   <front>
      <title>Problem Statement and Use Cases of Application-aware Networking (APN)</title>
      <author fullname='Zhenbin Li'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Shuping Peng'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Daniel Voyer'>
	 <organization>Bell Canada</organization>
      </author>
      <author fullname='Chongfeng Xie'>
	 <organization>China Telecom</organization>
      </author>
      <author fullname='Peng Liu'>
	 <organization>China Mobile</organization>
      </author>
      <author fullname='Zhuangzhuang Qin'>
	 <organization>China Unicom</organization>
      </author>
      <author fullname='Gyan Mishra'>
	 <organization>Verizon Inc.</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   Network operators are facing the challenge of providing better
   network services for users.  As the ever-developing 5G and industrial
   verticals evolve, more and more services that have diverse network
   requirements such as ultra-low latency and high reliability are
   emerging, and therefore differentiated service treatment is desired
   by users.  On the other hand, as network technologies such as
   Hierarchical QoS (H-QoS), SR Policy, and Network Slicing keep
   evolving, the network has the capability to provide more fine-
   granularity differentiated services.  However, network operators are
   typically unware of the applications that are traversing their
   network infrastructure, which means that not very effective
   differentiated service treatment can be provided to the traffic
   flows.  As network technologies evolve including deployments of IPv6,
   SRv6, Segment Routing over MPLS dataplane, the programmability
   provided by IPv6 and Segment Routing can be augmented by conveying
   application related information into the network satifying the fine-
   granularity requirements.

   This document analyzes the existing problems caused by lack of
   service awareness, and outlines various use cases that could benefit
   from an Application-aware Networking (APN) framework.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-li-apn-problem-statement-usecases-06'/>
   <format target='https://www.ietf.org/archive/id/draft-li-apn-problem-statement-usecases-06.txt' type='TXT'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

