<?xml version="1.0" encoding="US-ASCII"?>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC1069 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1069.xml">
<!ENTITY RFC1112 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1112.xml">
<!ENTITY RFC1195 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1195.xml">
<!ENTITY RFC2474 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2474.xml">
<!ENTITY RFC2730 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2730.xml">
<!ENTITY RFC2776 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2776.xml">
<!ENTITY RFC2909 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2909.xml">
<!ENTITY RFC3618 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3618.xml">
<!ENTITY RFC4291 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4291.xml">
<!ENTITY RFC4607 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4607.xml">
<!ENTITY RFC4655 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4655.xml">
<!ENTITY RFC5440 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5440.xml">
<!ENTITY RFC6282 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6282.xml">
<!ENTITY RFC6308 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6308.xml">
<!ENTITY RFC6740 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6740.xml">
<!ENTITY RFC6830 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6830.xml">
<!ENTITY RFC7285 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7285.xml">
<!ENTITY RFC7450 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7450.xml">
<!ENTITY RFC7665 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7665.xml">
<!ENTITY RFC7872 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7872.xml">
<!ENTITY RFC8200 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8200.xml">
<!ENTITY RFC8279 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8279.xml">
<!ENTITY RFC8296 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8296.xml">
<!ENTITY RFC8300 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8300.xml">
<!ENTITY RFC8402 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8402.xml">
<!ENTITY RFC8596 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8596.xml">
<!ENTITY RFC8684 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8684.xml">
<!ENTITY RFC8736 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8736.xml">
<!ENTITY RFC8754 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8754.xml">
<!ENTITY RFC8763 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8763.xml">
<!ENTITY RFC8799 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8799.xml">
<!ENTITY RFC8986 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9049 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9049.xml">
<!ENTITY RFC9098 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9098.xml">
<!ENTITY RFC9300 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9300.xml">
<!ENTITY RFC9301 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9301.xml">

<!ENTITY I-D.irtf-panrg-path-properties SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-panrg-path-properties">
<!ENTITY I-D.bonica-6man-ext-hdr-update SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.bonica-6man-ext-hdr-update">
<!ENTITY I-D.bryant-arch-fwd-layer-ps SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.bryant-arch-fwd-layer-ps">
<!ENTITY I-D.chunduri-lsr-isis-preferred-path-routing SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.chunduri-lsr-isis-preferred-path-routing">
<!ENTITY I-D.muscariello-intarea-hicn SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.muscariello-intarea-hicn">
<!ENTITY I-D.li-dyncast-architecture SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.li-dyncast-architecture">
<!ENTITY I-D.liu-dyncast-ps-usecases SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.liu-dyncast-ps-usecases">
<!ENTITY I-D.king-rtgwg-challenges-in-routing SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.king-rtgwg-challenges-in-routing">
<!ENTITY I-D.galis-irtf-sarnet21-report SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.galis-irtf-sarnet21-report">
<!ENTITY I-D.lhan-satellite-semantic-addressing SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.lhan-satellite-semantic-addressing">
<!ENTITY I-D.farrel-rtgwg-intro-to-semantic-networking SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.farrel-rtgwg-intro-to-semantic-networking">
<!ENTITY I-D.boucadair-irtf-sdn-and-semantic-routing SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.boucadair-irtf-sdn-and-semantic-routing">
<!ENTITY I-D.kw-rtgwg-satellite-rtg-add-challanges SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.kw-rtgwg-satellite-rtg-add-challanges">
]>

<rfc category="info" docName="draft-king-rtgwg-semantic-networking-survey-01" ipr="trust200902">
  <front>
    <title abbrev="Semantic Networking Survey">A Survey of Semantic Internet Networking Techniques</title>

    <author fullname="Daniel King" initials="D." surname="King">
      <organization>Lancaster University</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <country>UK</country>
        </postal>
        <email>d.king@lancaster.ac.uk</email>
      </address>
    </author>

    <author fullname="Adrian Farrel" initials="A." surname="Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <country>UK</country>
        </postal>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>

    <date month="" year="2023"/>

    <workgroup>RTGWG</workgroup>

    <keyword>Semantic Routing</keyword>
    <keyword>Semantic Addressing</keyword>

    <abstract>

      <t>The Internet Protocol (IP) has become the global standard in any computer network,
         independent of the connectivity to the Internet. Generally, an IP address is used
         to identify an interface on a network device. Routing protocols are also required
         and developed based on the assumption that a destination address has this semantic
         with routing decisions made on addresses and additional fields in the packet
         headers.</t>

      <t>Over time, routing decisions were enhanced to route packets according to additional
         information carried within the packets and dependent on policy coded in, configured
         at, or signaled to the routers. Many proposals have been made to add semantics to
         IP addresses.  The intent is usually to facilitate routing decisions based solely on
         the address and without finding and processing information carried in other
         fields within the packets.</t>

      <t>This document is presented as a survey to support the study and further research into
         clarifying and understanding the issues.  It does not pass comment on the advisability
         or practicality of any of the proposals and does not define any technical solutions</t>

    </abstract>

  </front>

  <middle>
    <section anchor="intro" title="Introduction">

      <t>The Internet continues to expand rapidly, and the Internet Protocol (IP) has become the global standard in
         many types of computer network independent of whether or what connectivity to the Internet it has.  At the
         same time, there are increasingly varied expectations of the services and service level objectives that can be
         required from networks.  For example, packet-delivery quality expectations beyond best effort is a growth area: throughput,
         latency, error recovery, and (absence of) packet or connectivity loss, reordering, or jitter.  Requirements
         include relative or absolute guarantees or predictable elastic changes under contention on these performance
         factors.  This places significant pressure on Service Providers to be aware of the type of services being
         delivered, and to have access to sufficient information about how individual packets should be treated to meet the user,
         application and application instance requirements.</t>

      <t>IP addresses facilitate the identification of how a device is attached to the Internet and how it is
         distinguished from every other device.  Addresses are used to direct packets to a destination (destination address) and
         indicate to where the receiver and network replies and error messages should be sent (source address).  An IP address may be assigned to
         each network interface of a device connected to a network that uses IP.  Applications use IP addresses to both identify a
         host and to indicate the physical or virtual location of the host.</t>

      <t>This document presents a brief survey of proposals to extend the semantics of IP addresses by
         assigning additional meanings to some parts of the address, or by partitioning the address into
         a set of subfields that give scoped addressing instructions.  Some of these proposals are
         intended to be deployed in limited domains <xref target="RFC8799"/> that are IP-based, while other
         proposals are intended for use across the Internet.  Limited domains may present their own challenges
         in terms of ensuring the perimeter of the domains, and connecting domains across the Internet.</t>

      <t>The impact that some proposals may have on routing systems could require clean-slate solutions,
         hybrid solutions, extensions to existing routing protocols, or potentially no changes at all.  A
         separate document (<xref target="I-D.king-rtgwg-challenges-in-routing" />) describes the challenges
         to the routing system presented by changes to IP address semantics, and sets out research questions
         that should be investigated by those proposing new semantic address schemes.</t>

    </section>

    <section anchor="network-path" title="Network Path Selection">

      <t>Two approaches are typically used for network path selection.  Firstly, a priori assessment by
         having the feasible paths and constraints computed in advance.  Secondly, real-time computation in
         response to changing network conditions.</t>

      <t>The first approach may be conducted offline and allows for concurrent or global optimization based on
         constraints and policy.  However. as network size and complexity increase, the required computing power may
         increase exponentially for this type of computation.</t>

      <t>The second approach must consider the speed of calculation where complex constraints are applied to
         the path selection.  This processing may delay service setup and the responsiveness to
         changes (such as failures) in the network.  Network topology filters may be applied to reduce the
         complexity of the network data and the computation algorithm, however, the path computation accuracy
         and optimality may be negatively affected.</t>

      <t>In both approaches, the amount of information that needs to be imported and processed can become very
         large (e.g., in large networks, with many possible paths and route metrics), which might impede the
         scalability of either method both in terms of the storage and the distribution of the information.</t>

      <t>In the last decade, significant research has been conducted into the architecture of the future Internet
         (for example, <xref target="RESEARCHFIAref" /> and <xref target="ITUNET2030ref" />).  During this research,
         several techniques emerged, highlighting the benefits of path awareness and path selection for end-hosts,
         and multiple path-aware network architectures have been proposed, including SCION <xref target="SCIONref"/>
         and RINA <xref target="RINAref"/>, and the work of the Path Aware Networking Research Group (PANRG) as
         discussed later in this document.</t>

      <t>When choosing the best paths or topology structures, the following may need to be considered:
         <list style="symbols">
            <t>The method by which a path, or set of paths, is to be calculated.  For example, a path may be selected
               automatically by the routing protocol or imposed (perhaps for traffic engineering reasons) by a
               central controller or management entity.</t>

            <t>The criteria used for selecting the best path.  For example, classic route preference, or administrative
               policies such as economic costs, resilience, security, and if requested, applying geopolitical
               considerations.</t>
          </list></t>

       <section anchor="pathaware" title="Path Aware Routing">

          <t>The current architecture for IP networking is built using a best-effort philosophy.  There are techniques discussed
             in this document that attempt better-than-best-effort delivery.  The start-point and end-point of a path
             are identified using IP addresses, and traffic is steered along the path that does not necessarily follow the
             "shortest path first" route through the network.  Furthermore, the path might not run all the way from a packet&apos;s source to its
             destination.  The assumption is that a packet reaching the end of a path is forwarded to its destination using
             best-effort techniques.</t>

          <t>Evaluating and building paths that respect requirements beyond the simple best-effort model is particularly
             challenging and computationally heavy since numerous quality-related parameters need to be considered.</t>

       </section>

    </section>

    <section anchor="overview" title="What is Semantic Networking?">

      <t>Networks are often divided into addressing regions for various administrative or technological
         reasons.  Different routing paradigms may be applied in each region, and specific "private" semantics
         may be applied to the IP addresses within a single region</t>

      <t>These address semantics are established using customer types, customer connections, topological
         constraints, performance groups, and security, etc.  Service Providers or network operators will
         apply local policies to user and application packets as they enter the network possibly mapping
         addresses, or encapsulating them with an additional IP header.  In some case, the packet
         has its source and destination within a single network and the network operator can apply
         address semantics policies across the whole network.  In other cases (such as general IP-based
         traffic), a packet will require a path across multiple networks, and each may apply its own set
         of traffic forwarding policies.  In these cases, there is often no consistency or guaranteed
         performance unless a Service Level Agreement (SLA) is applied to traffic traversing multiple
         networks.</t>

      <t>Semantic networking proposals may apply to addresses in a specific domain, or domain set. In this context, a
         "limited domain" means that the interpretation of the address, in a semantic networking domain, is
         only applicable to a well-defined set of network nodes, or specific points in the network.
         If a packet bearing an address with a modified semantic were to escape from the domain, the special
         meaning of the address would be lost. Additionally (or alternatively), the meaning of
         "specific points in the network" may be applied to the source and destination nodes of a packet,
         while all transit nodes are unaware of the special semantic. However, it could be the case that
         some key transit nodes are able to access the meaning of the address and so apply special routing
         or other functions to the packet.</t>

      <t>Such proposals include the following:
         <list style="symbols">
           <t>Providing semantics specific to mobile networks so that a user or device may move
              through the network without disruption to their service <xref target="CONTENT-RTG-MOBILEref"/>.</t>
           <t>Enabling optimized multicast traffic distribution by encoding multicast tree and replication
              instructions within addresses <xref target="MULTICAST-SRref"/>.</t>
           <t>Using addresses to identify different device types so that their traffic may be handled
              differently <xref target="SEMANTICRTG"/>.</t>
           <t>Content-based routing (CBR), forwarding of the packet based on message content rather than the
              destination addresses <xref target="OPENSRNref"/>.</t>
           <t>Deriving IP addresses from the lower layer identifiers and using addresses depending on the
              underlying connectivity (for example, <xref target="RFC6282" />.</t>
           <t>Identifying hierarchical connectivity so that routing can be simplified <xref target="EIBPref"/>.</t>
           <t>Providing geographic location information within addresses <xref target="GEO-IPref"/>.</t>
           <t>Indicating the application or network function on a destination device or at a specific location; or
              enable Service Function Chaining (SFC).</t>
           <t>Expressing how a packet should be handled, prioritized, or allocated network resources as it is
              forwarded through the network <xref target="TERASTREAMref"/>.</t>
           <t>Using cryptographic algorithms to mask the identity of the source or destination, masking routing tables
              within the domain, while still enabling packet forwarding across the network <xref target="BLIND-FORWARDINGref"/>.</t>
         </list></t>

      <t>In many cases, it may be argued that existing mechanisms applied on top of the common address semantic
         defined in <xref target="RFC4291" /> can deliver the correct functionality for these scenarios.  That is,
         packets may be tunneled over IP using several existing encapsulation techniques.  Nevertheless, there
         is pressure to reduce the amount of encapsulation (partly to resist reduction in the maximum transmission
         unit (MTU) over the network, and partly to achieve a flatter and more transparent network architecture).
         This leads to investigations into whether the current IP addresses can be "overloaded" (without any
         negative connotations being attached to that word) by adding semantics to the addresses.</t>

      <t>Semantic Networking is the process of routing and forwarding packets that contain IP addresses with additional
         semantics, possibly using that information to perform policy-based routing or other enhanced
         routing functions.  Thus, faciliating enhanced routing decisions based on these additional semantics and provide
         differentiated paths for different packet flows, distinct from simple shortest path first
         routing.  The process known as Semantic Networking is described further in
         <xref target="I-D.farrel-rtgwg-intro-to-semantic-networking" />.</t>

      <t>Key use cases exist for semantic networking, typically for specific applications and deplyments, including
         low earth orbit (LEO) satellite constellations <xref target="I-D.lhan-satellite-semantic-addressing" />.</t>

      <t>Based on a variety of use cases, key technical challenges exist for semantic networking: these are discussed
         further in <xref target="I-D.king-rtgwg-challenges-in-routing" />.</t>

      <section anchor="architecture" title="Architectural Considerations">

        <t>Semantics may be applied in multiple ways to integrate with existing routing architectures.  The most obvious
           is to build an overlay such that IP is used only to route packets between network nodes that utilize the
           semantics at a higher layer.  There are several uses of this approach, including Service Function Chaining
           (SFC) (see <xref target="sfc"/>) and Information Centric Networking (ICN) (see <xref target="info-naming"/>).  An
           overlay may be achieved in a higher layer, or may be performed using tunneling techniques (such as IP-in-IP)
           to traverse the areas of the IP network that cannot parse additional semantics and so join together those
           nodes that use the semantics.</t>

        <t>The application of semantics may also be constrained to within a limited domain.  In some cases, such a domain
           will use IP, but be disconnected from Internet.  In those cases, the challenges are limited to enabling the
           desired function within the domain.  In other cases, traffic from within the domain is exchanged with other
           domains that are connected across an IP-based network using tunnels or via application gateways.
           And in another case traffic from the domain is routed across the Internet to other nodes and this requires
           backward-compatible routing approaches, tunnels, or gateway functions.</t>

        <t>Limited domains <xref target="RFC8799" /> are a fact of networking life.  They are used to safely deploy
           or test features and functions in a controlled environment so that they cannot contaminate other networks or
           the Internet in general.  Examples of a limited domain in use today include:
           <list style="symbols">
              <t>Internet of Things (IoT) networks such as factory floors or home networks</t>
              <t>Deterministic Networks (DetNet) that operate in campus networks or private WANs to provide deterministic
                 data paths with bounded latency, low loss, predictable jitter, and high reliability.</t>
              <t>Content Distribution Networks (CDN) where clusters of servers share content provision but may also
                 need to be interconnected.</t>
              <t>Physical security may be provided for a site simply by not permitting traffic to enter or leave the
                 site.  This may be expanded by connecting multiple sites together using tunnels across the Internet
                 to form a Virtual Private Network (VPN).</t>
           </list></t>

        <t>Limited domains are also used as a driver for innovation.  They provide a safe space to run experiments and
           deploy new functions such as advances in traffic steering, improvements in security, and new routing protocols.
           A limited domain is a way to achieve incremental deployability on an isolated island, and this enables
           innovation that may (or may not) percolate to the whole Internet at a later stage.  For example, experiments
           to increase the programmability of network forwarding functions need to be carried out in networks of similarly
           capable nodes (to avoid the risks of broken interoperability or forwarding loops), yet these experiments
           need to use real user data that is flowing between hosts and servers.</t>

        <t>Because limited domains don&apos;t always operate in isolation they may need to be connected to other domains
           over the Internet, or other nodes within the wider Internet.</t>

      </section>

    </section>

    <section anchor="exist" title="Existing Approaches for Routing Based on Additional Semantics">

      <t>Several IETF-based approaches are available to allow service providers to perform policy-based routing,
        including identifying and marking IP traffic either by changing the semantic of IP addresses or by adding
        such a semantic in other fields/namespaces, enabling differentiated handling by transit routers (queuing,
        dropping, forwarding, etc.).  The sections below distinguish between those schemes that perform routing
        based on information other than IP addresses, those that establish an overlay network in which to apply
        semantics, and those that add semantics to the addresses.  A further separate group of approaches is
        presented here to cover the concept of group semantics where a single address identifies more than one
        endpoint.</t>

      <section anchor="nonaddress" title="Non-Address-Based Routing">

        <t>Many routing schemes examine the destination address field and other fields in the packet header to make
           routing decisions. These approaches (sometimes referred to as "policy-based routing") allow
           packets to follow different paths through the network depending on semantics assigned to these other fields
           or based on hashing algorithms operating on the values of those fields.</t>

        <section anchor="DPI" title="Deep Packet Inspection">

          <t>Deep Packet Inspection (DPI) may be used by a router to learn the characteristics of packets
             in order to forward them differently.  This involves looking into the packet beyond the top-level
             network-layer header to identify the payload.  Once identified, the traffic type can be used
             as an input for marking the packets for network handling, or for performing specific policies
             on the packets.</t>

          <t>However, DPI may be expensive both in processing costs and latency.  The processing costs means that
             dedicated infrastructure is necessary to carry out the function, and this may have an associated
             financial cost.  The latency incurred may be too much for use with any delay/jitter sensitive
             applications.  As a result, DPI is difficult for large-scale deployment and its usage is often
             limited to specific functions at the edge of the network.</t>

          <t>Despite this, "shallow DPI" is commonplace in routers today as they examine the five-tuple of source
             address, destination address, payload protocol, source port, and destination port to perform a hash
             function for ECMP purposes (a form of policy-based routing).</t>

        </section>

        <section anchor="DS" title="Differentiated Services">

          <t>Quality of Service (QoS) based on Differentiated Services <xref target="RFC2474"/> is a widely deployed
             framework specifying a simple and scalable coarse-grained mechanism for classifying and managing
             network traffic.  However, in a service providers network, DiffServ codepoint (DSCP) values
             cannot be trusted when they are set by the customer, and may have different meanings as packets are
             passed between networks.</t>

          <t>In real-world scenarios, Service Providers deploy "remarking" points at the edges of their network,
             re-classifying received packets by rewriting the DSCP field according to local policy using
             information such as the source/destination address, IP protocol number, transport layer
             source/destination ports, and possibly applying DPI as described in <xref target="DPI"/>.</t>

          <t>The traffic classification process and node-by-node processing leads to increased packet
             processing overhead and complexity at the edge of the Service Providers network.</t>

        </section>

        <section anchor="IPv6" title="IPv6 Extension Headers">

           <t><xref target="RFC8200"/> defines the IPv6 header and also a number of extension headers.  These extension headers can be used
              to carry additional information that may be used by transit routers (the hop-by-hop options header) or by the destination
              identified by the destination address field (the destination options header).  In addition, these extension headers could encode
              additional semantics that might enable routing decisions and determine what functions and operations should be performed on a packet.</t>

           <t><xref target="RFC7872"/> and <xref target="RFC9098"/> provide some discussions about the operational
              problems of using IPv6 extension headers, especially in multi-domain environments, while <xref target="I-D.bonica-6man-ext-hdr-update"/>
              proposes to update RFC 8200 with guidance regarding the processing, insertion and deletion of IPv6 extension headers.</t>

        </section>

      </section>

      <section anchor="overlay" title="Semantic Overlays">

        <t>An overlay network is built on top of an underlay or transport network.  Packets are encapsulated
           with the header for the overlay network to carry the additional information needed to provide the
           desired function, and then the packets are encapsulated for transport through the underlay network.
           In this case, no changes are made to the meaning of the IP addresses in the underlay, but the
           destination address identifies the next hop in the overlay network rather than the ultimate
           destination of the packet.  In this way, packets can be steered through different overlay nodes
           where routing decisions can be made.</t>

        <section anchor="ALTO" title="Application-Layer Traffic Optimization">

          <t>Application-Layer Traffic Optimization (ALTO) <xref target="RFC7285"/> is an architecture and protocol.
             ALTO defines abstractions and services to provide simplified network views and network services to guide
             the application usage of network resources, including cost.</t>

          <t>An ALTO server gathers information about the network and answers queries from an ALTO client that wants to
             find a suitable path for traffic.  ALTO responses are typically used to route whole flows (not individual
             packets) either to suitable destinations (such as network functions) or onto paths that have specific
             qualities.</t>

        </section>

        <section anchor="MPTCP" title="Multipath TCP">

          <t>Multipath TCP (MPTCP) <xref target="RFC8684"/> enables the use of TCP in a multipath network using multiple
             host addresses.  A Multipath TCP connection provides a bidirectional bytestream between two hosts communicating
             like normal TCP and thus does not require any change to the applications.  However, Multipath TCP enables the
             hosts to use different paths with different IP addresses to exchange packets belonging to the MPTCP connection.</t>

          <t>MPTCP increases the available bandwidth, and so provides shorter delays; it increases fault tolerance, by
             allowing the use of other routes when one or more routes become unavailable; and it enables traffic engineering
             and load balancing.</t>

        </section>

        <section anchor="sfc" title="Service Function Chaining">

          <t>Service Function Chaining (SFC) <xref target="RFC7665"/> is the process of sending traffic through an ordered set
             (a sequence) of abstract service functions.  This may be achieved using an overlay encapsulation such as the Network Service
             Header (NSH) <xref target="RFC8300"/> or MPLS <xref target="RFC8596"/> that rely on tunneling through an underlay
             without any additional semantics applied to the IP addresses.</t>

          <t>Alternatively, SFC can be performed by adding semantics to the addresses, for example, as in <xref target="SR"/>.</t>

        </section>

        <section anchor="PCE" title="Path Computation Element">

          <t>The Path Computation Element (PCE) <xref target="RFC4655"/> is an architecture and protocol <xref target="RFC5440"/>
             that can be used to assist with network path selection.  A PCE is an entity capable of computing paths for a single
             or set of services.  A PCE might be a network node, network management station, or dedicated computational platform
             that is resource-aware and has the ability to consider multiple constraints for sophisticated path computation.
             PCE applications compute label switched paths for MPLS and GMPLS traffic engineering, but the PCE has been extended
             for a variety of additional traffic engineering problems.</t>

        </section>

      </section>

      <section anchor="additions" title="Semantic Networking">

        <t>In semantic networking, additional information or meaning is placed into the IP address, and this is used to route
           packets within the network.</t>

        <section anchor="LISP" title="Locator/ID Separation Protocol (LISP)">

          <t>The Locator/ID Separation Protocol (LISP) <xref target="RFC6830"/> was published by the IETF as an
             Experimental RFC in 2013 and has now been moved to the Standards Track <xref target="RFC9300"/> and
             <xref target="RFC9301"/>.  LISP separates IP addresses into two numbering spaces: Endpoint Identifiers
             (EIDs) and Routing Locators (RLOCs).  The former, the EIDs, are used to identify communication end-points (as the name states)
             as well as local routing and forwarding in the edge network.  The latter, RLOCs, are used to locate the EIDs in the Internet
             topology end are usually the address of ASBRs (Autonomous System Border Routers).  IP packets addressed with EIDs are
             encapsulated with RLOCs for routing and forwarding over the Internet.</t>

          <t>As end-to-end packet forwarding includes both EIDs and RLOCs an additional control-plane is needed.  This control plane provides
             a mapping system and basic traffic engineering capabilities.  Multihoming becomes easier because one EID can be associated to
             more than one RLOC or even to a local network address prefix.</t>

        </section>

        <section anchor="ILNP" title="Identifier-Locator Network Protocol">

          <t>The Identifier-Locator Network Protocol (ILNP) <xref target="RFC6740"/> is an experimental network protocol designed
             to separate the two functions of network addresses: identification of network endpoints, topology or location
             information.  Differently from LISP, ILNP encodes both locator and identifier in the IPv6 address format (128 bits).  More specifically,
             the most significant 64 bits of the 128 bits IPv6 address is the locator, while the less significant 64 bits form the identifier.
             Upon reaching the destination network, a cache is used to find the corresponding node.  Furthermore,
             DNS can be dynamically updated, which is essential for mobility and also for provider-independent addresses.  Similar
             to LISP, multihoming can be set by assigning multiple locators to the same identifier.  In addition, identifiers can
             also be encrypted for privacy reasons.  It was intended that ILNP should be backwards-compatible with existing IP,
             and that it should be incrementally deployable.</t>

        </section>

        <section anchor="SR" title="Segment Routing">

          <t>Segment Routing (SR) <xref target="RFC8402" /> leverages the source routing paradigm.  A node
             steers a packet through an ordered list of instructions, called "segments".  A segment can
             represent any instruction, topological or service based.  A segment can have a semantic local
             to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be
             restricted to a specific topological path, while maintaining per-flow state only at the ingress
             node(s) to the SR domain.</t>

          <t>In SR for IPv6 networks (SRv6) segment routing functions are used to achieve a networking objective
             that goes beyond packet routing, in order to provide "network programming"
             <xref target="RFC8986" />.  The network program is expressed as a
             list of instructions, which are represented as 128-bit segments, called Segment Identifiers (SID) -
             encoded and presented in the form of an IPv6 address.  The first instruction of the network program
             is placed in the Destination Address field of the packet.  If the network program requires more than
             one instruction, the remaining list of instructions is placed in the Segment Routing Extension Header
             (SRH)<xref target="RFC8754"/>.</t>

          <t>An SRv6 instruction can represent any topological or service-based instruction.  The SRv6 domain
             is the service provider domain where SRv6 services are built to transport any kind of customer
             traffic including IPv4, IPv6, or frames.  SRv6 is the instantiation of Segment Routing deployed
             on the IPv6 data plane.  Therefore, in order to support SRv6, the network must first be enabled
             for IPv6.</t>

          <t>The SRH in the IPv6 header is only processed for nodes forwarding traffic if the destination address
             identifies the local node. In this case, the node must take several actions, including reading the SRH,
             performing any node-specific actions identified by the destination address or the next SIDs in the SRH,
             and re-writing the IPv6 destination address field using information from the SRH before forwarding the
             packet.</t>

        </section>

        <section anchor="ppr" title="Preferred Path Routing">

          <t>Preferred Path Routing (PPR) <xref target="I-D.chunduri-lsr-isis-preferred-path-routing"/> is a proposed routing protocol mechanism
             where alternate forwarding state is installed for a set of different preferred paths.  Each preferred path
             is described as an ordered linear list of nodes, links, and network functions, and the path is identified
             by a network-global preferred path identifier.  If a packet is marked with preferred path identifier, it is
             forwarded according to the preferred path that has been installed on the router.  If a packet is not marked
             or if the preferred path is not installed on the router, the packet is forwarded using the normal shortest
             path first algorithm.</t>

          <t>In PPR, the preferred path identifier is encoded in an IP address, but the address is only used in an
             encapsulation of the end-to-end packet.  This approach is a hybrid in that it is applying a different meaning to the
             IP addresses, using that meaning in an encapsulation, but routing the packets through an existing IP network.</t>

        </section>

        <section anchor="CLNP" title="Connectionless Network Protocol">

          <t>The Connectionless Network Protocol (CLNP) <xref target="CLNPref"/> is a network layer encoding that supports variable
             length, hierarchical addressing.  It is widely deployed in many communications networks and is the ITU-T&apos;s
             standardized encoding for packets in the management plane for Synchronous Digital Hierarchy (SDH) networks.  For a
             while, CLNP was considered in competition with IP as the network layer encoding for the Internet, but IP (in conjunction
             with TCP) won out.</t>

          <t>Many of the considerations for semantic addressing can be handled using CLNP, and it is particularly well suited to applications
             that demand variable-length addresses or that structure addresses hierarchically for routing or geo-political reasons.</t>

          <t>Routing for CLNP can be achieved using the IS-IS routing protocol in its full form as documented in <xref target="ISISref" />
             rather than its IP-only form <xref target="RFC1195"/>.  While this may make it possible to use CLNP alongside IP in some
             routed networks, it does not integrate the use of IP addresses with additional semantics with the historic use of IP addresses
             except in "ships that pass in the night" fashion.  Alternatively, <xref target="RFC1069"/> explains how to carry regular IP
             addresses in CLNP.</t>

        </section>

      </section>

      <section anchor="groupsemantics" title="Group Semantics">

         <t>A mayor enhanced addressing semantic in IP is called "group semantics".  Here, an IP address identifies more than one
            individual interface or node.  This facilitates the delivery of a packet to any one of a group of destinations, or to all
            group members.</t>

          <section anchor="multicast" title="Multicast">

            <t>Multicast address semantics support delivery to all members of a group of destinations.  This is a controlled variant of
               broadcasting where packets are delivered to all possible receivers in a particular (static) scope such as a multi-access
               link.  Membership of a multicast link is dynamically signalled by the group members, and a group is identified by a
               specific address.</t>

            <t>IP multicast <xref target="RFC1112" />, based on the protocol and service definition aspects of Steve Deering&apos;s PhD,
               is widely deployed for IPv4.  It is equally adopted and used in IPv6 using the addressing architecture specified in
               <xref target="RFC4291" />.  In IP multicast (Any Source Multicast - ASM) any node can send to the multicast group and
               have its packets delivered to all members of the group.</t>

            <t>Research deployments in the 1990s (the so called 'MBone' <xref target="MBONEref"/>) indicated that IP multicast gave
               rise to a number of issues related to address assignment, implementation, scale, and security.  The problem of allocation
               and management of IP multicast (group) addresses led to several proposals, including Multicast Address Dynamic Client
               Allocation Protocol (MADCAP) <xref target="RFC2730" />, the Multicast Address Allocation Architecture (MALLOC)
               <xref target="RFC6308" />, the Multicast Address-Set Claim Protocol (MASC) <xref target="RFC2909" />, and the
               Multicast-Scope Zone Announcement Protocol (MZAP) <xref target="RFC2776" />, but none was widely adopted.  Attempts to
               create a complete routing protocol suite for IP multicast service model within the IETF resulted in the Multicast Source
               Discovery Protocol (MSDP) being published as an experimental RFC <xref target="RFC3618" />.</t>

            <t>The popularity of multicast as a concept and the widespread deployment of commercial IPv4 multicast led to the development
               of "Source Specific Multicast" service (SSM) <xref target="RFC4607" />.  In SSM, the combination of the Source and Group
               addresses (S,G) of an IP multicast packet form a so-called SSM channel address, which identifies group of receivers and
               implies a single permitted sender.  Receivers subscribe to every SSM channel.</t>

            <t>From a service user&apos;s perspective, SSM solves the security issue (only valid sources can send traffic) and the address
               assignment issue (all group addresses are relative to the source address). For the operator, SSM also eliminates
               the complex operational requirements of ASM.</t>

         </section>

         <section anchor="aotocast" title="Automatic Multicast Tunneling">

            <t>Automatic Multicast Tunneling (AMT) <xref target="RFC7450" /> is a protocol for delivering
               multicast traffic from sources in a multicast-enabled network to receivers that lack multicast
               connectivity to the source network.  The protocol uses UDP encapsulation and unicast replication
               to provide this functionality as a hybrid solution using both multicast routing and an overlay
               approach.</t>

         </section>

         <section anchor="bier" title="Bit Index Explicit Replication">

            <t>The IETF standardized or otherwise deployed protocol solutions in support of ASM and SSM in about 2015 relied all
               on per-hop, per ASM-group/per-SSM-channel stateful hop-by-hop forwarding/replication.  Service Provider at that
               time were starting to removing or reduce heavy-weight control and per-hop forwarding processing in unicast caused by
               MPLS LDP/RSVP-TE driven designs, replacing it with more lightweight MPLS-SR and later SRv6 forwarding and associated control
               planes.  But to reduce the cost for multicast service, the only transit-hop stateless solution available was ingress-replication,
               tunnel multicast across unicast, hence trading hop-by-hop state (and its control and management plane cost) in the network against
               traffic overhead and (under congestion) higher latency.</t>

            <t>Bit Index Explicit Replication (BIER) <xref target="RFC8279" /> addresses these problems.  BIER does not contain the notion of
               ASM or SSM groups.  Instead, a sender enumerates the set of receivers to which the packet is to be delivered.  The network routers
               forward packets and replicate them onto the shortest paths to the destinations.  As the packets are replicated, so the enumeration
               of the receivers is pruned on each copy of the packet.</t>

            <t>BIER is able to use existing routing protocols without modification, but requires enhancements in the forwarding plane to
               encode, parse, and act on the set of receivers.  The BIER information is carried in new encapsulations <xref target="RFC8296" />
               that is carried hop-by-hop in IP.  Thus, the additional semantic is in an overlay.</t>

         </section>

      </section>

    </section>

    <section anchor="research" title="Overview of Current Routing Research Work">

          <t>This section presents a limited survey of techniques and projects that provide mechanisms to facilitate path and forwarding
             decisions based on contextual information.</t>

          <t>More recently, the proceedings of the June 2021 Semantic Addressing and Routing for Future Networks (SARNET-21) Workshop was
             compiled and published as <xref target="I-D.galis-irtf-sarnet21-report"/>. It captures the views and positions of the
             participants as expressed during the workshop.</t>

        <section anchor="forwarding" title="Forwarding">

        <t>Some research work is engaged in examining the emerging set of new requirements that exceed the network
           and transport services of the current Internet, which only delivers "best effort" service.  This work aims
           to determine what features can be built on top of existing solutions by adding additional new components or
           features.  A starting point for this discussion can be found in <xref target="I-D.bryant-arch-fwd-layer-ps"/>.</t>

        <t>Several additional techniques for improving IP-based routing have been proposed, some of
           these are highlighted below.</t>

          <section anchor="PANRG" title="Path Aware Networking">

           <t>The IRTF&apos;s Path Aware Networking Research Group <xref target="PANRGref"/> aims to support research in bringing path aware techniques
              into use in the Internet.  This research overlaps with many past and existing IETF and IRTF efforts, including multipath transport protocols,
              congestion control in multiply-connected environments, traffic engineering, and alternate routing architectures.</t>

           <t><xref target="I-D.irtf-panrg-path-properties"/> offers a vocabulary of path properties.  By doing so it gives some clarity of the distinction
              between path aware routing and semantic networking as considered in this document.</t>

           <t><xref target="RFC9049"/> provides a catalog and analysis of past efforts to develop and deploy Path Aware techniques.
              Most, but not all, of these mechanisms were considered at higher levels, although some apply at the IP routing and forwarding layer.</t>

          </section>

        </section>

        <section anchor="trust" title="Trust and Accountability">

            <section anchor="SCION" title="Scalability, Control, and Isolation on Next-Generation Networks">

             <t>The SCION (Scalability, Control, and Isolation on Next-Generation Networks) <xref target="SCIONref"/> inter-domain
                network architecture has been designed to address security and scalability issues and provides an
                alternative to current Border Gateway Protocol (BGP) solutions.  The SCION proposal combines a globally
                distributed public key infrastructure, a way to efficiently derive symmetric keys between any network
                entities, and the forwarding approach of packet-carried forwarding state.</t>

             <t>SCION End-hosts fetch viable path segments from the path server infrastructure, and construct the exact
                forwarding route themselves by combining those path segments.  The architecture ensures that a
                variety of combinations among the path segments are feasible, while cryptographic protections
                prevent unauthorized combinations or path-segment alteration.  The architecture further enables path
                validation, providing per-packet verifiable guarantees on the path traversed.</t>

            </section>

        </section>

        <section anchor="layering" title="Layering">

          <section anchor="RINA" title="Recursive InterNetwork Architecture">

             <t>Recursive Inter Network Architecture (RINA) <xref target="RINAref"/> builds upon the principle that applications communicate through
                Inter-process Communication (IPC) facilities.  For an application to communicate through the
                distributed IPC facility, it only needs to know the name of the destination application and to use the
                IPC interface to request communication.</t>

             <t>By leveraging IPC concepts, RINA allows two processes to communicate, IPC requires certain functions
                such as locating processes, determining permission, passing information, scheduling, and managing
                memory.  Similarly, two applications on different end-hosts should communicate by utilizing the services
                of a distributed IPC facility (DIF).  A DIF is an organizing structure, generally referred to as a
                "layer".</t>

             <t>The scope and functions provided by the different IPC facilities may vary given the different type of
                network and performance goals.  Moreover, an IPC layer may recursively request services from other IPC
                layers.  The idea of recursively using multiple inter-process communication services creates a
                multilayer structure repeated until an IPC facility can fit well for physical technologies, e.g.,
                wired or wireless networks.</t>

          </section>

        </section>

        <section anchor="naming" title="Naming">

          <section anchor="info-naming" title="Information Naming">

           <t>Information-Centric Networking (ICN) <xref target="ICNref"/> is an approach to evolve the Internet infrastructure
              away from a host-centric paradigm, based on perpetual connectivity and the end-to-end principle, to a network architecture
              in which the focal point is information (or content or data) that is assigned specific identifiers.</t>

           <t>Several scenarios exist for semantic-based networking, providing reachability based on Content Routing <xref target="CONTENTref"/>
              and Name Data Networking <xref target="NDNref"/>.  The technology area of ICN is now reaching maturity, after many years of research
              and commercial investigation.  A technical discussion into the deployment and operation of ICNs continues in the IETF:
              <xref target="RFC8763"/> provides several important deployment considerations for facilitating ICN and practical deployments.</t>

           <t>Although ICN is primarily an overlay technology, a more recently concept, Hybrid-Information-Centric Networking (hICN), has been
              introduced <xref target="HICNref"/>.  In an hICN environment the ICN aspect is integrated into the IPv6 architecture, reusing
              existing IPv6 packet formats with the intention of maintaining compatibility with existing and deployed IP network technology
              without creating overlays that might require a new packet format or additional encapsulations.  The work is described in
              <xref target="I-D.muscariello-intarea-hicn"/>.</t>

          </section>

          <section anchor="svc-naming" title="Service Naming">


            <section anchor="dyncast" title="Dynamic Anycast">

                <t>Dyncast (Dynamic anycast) addresses the problem of directing traffic from a client to one service instance
                   among several available, while considering decision metrics beyond shortest path when doing so.  Those service
                   instances are therefore possible destinations for a specific service demand.  <xref target="I-D.liu-dyncast-ps-usecases"/>
                   outlines several use cases where such traffic steering requirement is desirable and may occur, such as in edge
                   computing scenarios but also in distribution of video content in scenarios like autonomous driving.  The draft
                   also outlines problems with existing solutions, most notably latency in changing relations from one service
                   instance to another due to a change in metric, which defines that decision (e.g., load in servers, latency,
                   or a combination of several such metrics).</t>

                <t>Key to the proposed dyncast <xref target="I-D.li-dyncast-architecture"/> architecture is to build on the notion
                   of (IP) anycast, while changing the addressing semantic from a locator-based addressing to a service-oriented one.
                   Here, the initial "service demand" packet is being identified through a service identifier as destination address.
                   This identifier is then mapped onto a binding IP (locator-based) address at the ingress of the network, allowing
                   for locator-based routing to be used throughout the network.  The ingress-based architecture is designed in such
                   a way that ingress nodes upon arrival of a new service demand can determine which instance (i.e., which binding
                   IP address) to use considering both network- and service-related metrics.  Furthermore, these metrics can be
                   distributed among ingress nodes in various ways, including over a routing protocol solution.</t>

                <t>The overall forwarding decision is based on the adherence to what is termed "instance affinity", i.e.,
                   the need to adhere to a previous routing decision for more than one packet, unlike IP forwarding on locator
                   addresses.  This affinity is created, by means of a binding table on the ingress nodes, since often more than one
                   packet is needed for the overall service-level transaction with a specific service instance.  For instance, HTTP
                   requests may span more than one routed packet.  Also, a service instance may also create ephemeral state, which
                   requires the client to continue communicating with this instance for the duration of this state.  While the affinity
                   is entirely defined by the application layer protocol, the network layer takes the affinity marking as input into
                   the decision to renew its routing decision.</t>
            </section>

            <section anchor="prioritycast" title="Prioritycast">

               <t>A modification to anycast that can be instantiated by additional engineering in the routing system is
                  called "prioritycast".  Instead of relying on the shortest path forwarding semantic, prioritycast directs all
                  traffic to the anycast address instance that is reachable and has the highest priority.  This approach only
                  requires small modifications to routing protocols so that priorities are advertised along side the addresses.</t>

               <t>Prioritycast was originally introduced as a recommended operational practice for
                  deployments of Bidirectional PIM (Bidir-PIM) <xref target="RFC8736" /> which requires a single active instance
                  of its Rendezvous Point (RP) service.  The RP is the root of a bidirectional tree and prioritycast
                  addresses for RP allow fast failover without additional redundancy protocols beside the routing
                  protocol, which would otherwise be necessary for such a redundancy service.</t>



            </section>

          </section>

          <section anchor="struc-naming" title="Structured Topological Naming">

             <t>The Internet uses DNS for single-level name resolution, converting user-level domain names into IP addresses.
                However, techniques are being proposed for multiple levels of name resolution; these would include:
                application-level and user-level descriptors, service identifiers, function identifiers and endpoint identifiers,
                which may then be mapped to IP addresses. These additional levels of naming and resolution would allow services
                and components to construct the service to be easily identifiable and directly and persistently named.</t>

          </section>

          <section anchor="geo-naming" title="Geographical Naming">

             <t>TBD</t>

          </section>

          <section anchor="path-naming" title="Path-based Naming">

             <t>TBD</t>


             <section anchor="icnp" title="ICNP">

                <t>Information-centric networking (ICN) is an approach to evolve the Internet infrastructure to directly support
                   this use by introducing uniquely named data as a core Internet principle. Data becomes independent from location,
                   application, storage, and means of transportation, enabling in-network caching and replication.</t>

             </section>

             <section anchor="reed" title="Reed">

                <t>TBD</t>

             </section>

          </section>

         <section anchor="cbr" title="Content-Based Routing">

             <t>The OpenSRN <xref target="OPENSRNref"/> project proposed a Content-Based Routing Scheme (CBR) that uses packet content and header information to
                forward traffic conetextually. This proposal uses a novel software defined networking architecture to provide a semantic
                routing for big data network applications.</t>

         </section>

        </section>

        <section anchor="routing" title="Routing">

          <section anchor="idr" title="Inter-Domain Routing">

             <section anchor="EIBP" title="Expedited Internet Bypass Protocol">

                <t>The Expedited Internet Bypass Protocol (EIBP) <xref target="EIBPref"/> is a clean slate approach to routing and
                   forwarding in the Internet using the Internet infrastructure, but bypassing the Internet Protocol (IP).
                   The EIBP method may be deployed in current routers and when invoked for a specific end to end IP hosts or
                   networks, EIBP bypasses the heavy traffic and security challenges faced at Layer-3.  EIBP does not
                   require routing protocols, instead it abstracts network structural (physical or logical) information
                   into intelligent forwarding addresses that are acquired by EIBP routers automatically.</t>

                <t>The Forwarding tables used by EIBP are proportional to the connectivity (degree) at a routing device
                   making the protocol scalable.  The EIBP routing system does not require network-wide dissemination.
                   Topology change impacts are local and thus instabilities on topology changes are minimal.  EIBP is a low
                   configuration protocol, which can be deployed in an AS and extended to multiple ASes independently.
                   EIBP evaluations were conducted using GENI testbeds and compared to IP using Open Shortest Path First
                   and Border Gateway Protocol.  Significant performance improvements in terms of convergence and churn
                   rates highlight the capabilities of EIBP.</t>

             </section>



          </section>

          <section anchor="itradr" title="Intra-Domain Routing">


          </section>

        </section>

        <section anchor="nop" title="No Changes Needed">

        <t>It is entirely possible that some forms of modified address semantic will work perfectly well with existing
           routing protocols and mechanisms either across the whole Internet or within limited and carefully controlled
           domains.  Claims for this sort of functionality need to be the subject of careful research and analysis as
           the existing protocols were developed with a different view of the meaning of IP addresses, and because routing
           systems are notoriously fragile.</t>

        </section>

        <section anchor="uc" title="Use Cases">

        <t>Several documents are availible that discuss the requirements for applications and services that may benefit from
           Semantic Networking techniques, including:</t>

           <ul>
             <li><xref target="I-D.boucadair-irtf-sdn-and-semantic-routing"/> This document examines the applicability of SDN techniques to
                 Semantic Networking and provides considerations for the development of Semantic Networking solutions in the context
                 of SDN.</li>

             <li><xref target="I-D.kw-rtgwg-satellite-rtg-add-challanges"/>  This document summerises near-to-mid-term space-networking problems;
                 it outlines the key components, challenges, and requirements for integrating future space-based network infrastructure with existing
                 networks and mechanisms. Furthermore, this document highlights the network control and transport interconnection, and identify the
                 resources and functions required for successful interconnection of space-based and Earth-based Internet infrastructure.</li>
           </ul>

        </section>

    </section>

   <section anchor="challenges" title="Challenges for Internet Routing Research">

       <t>Improving IP-based semantic network routing capabilities and capacity so that they scale and address a
          set of growing requirements presents significant research challenges, and will require contributions
          from the networking research community.</t>

       <section anchor="questions" title="Routing Research Questions to be Addressed">

          <t>As research into the scenarios and possible uses of semantic networking progresses, a number of questions need to
             be addressed in the scope of routing.  These questions go beyond "Why do we need this function?" and "What could we
             achieve by carrying this additional semantic in an IP address?"  The questions are also distinct from issues of how
             the additional semantics can be encoded within an IP address.  All of those issues are, of course, important considerations
             in the debate about semantic networking, but they form part of the essential groundwork of research into semantic
             routing itself.</t>

          <t><xref target="I-D.king-rtgwg-challenges-in-routing"/> sets out the challenges for the routing system, and how it might
             be impacted by the use of semantic networking.</t>

      </section>

    </section>

    <section anchor="security" title="Security Considerations">

      <t>This document is a survey of existing work and so introduces no security considerations of itself.  However, many of
         the proposals referenced either are intended to improve security or have their own security implications. For example:

         <list style="symbols">
            <t>In-network path selection, the criteria used for selecting the best path may include security considerations.</t>

            <t>Semantic networking, and applied to specific addresses, may be established using security criteria.</t>

            <t>Physical security may be provided for a site or limited domain simply by not permitting traffic to enter or leave
               the site.  This may be expanded by connecting multiple sites together using tunnels across the Internet to form a
               Virtual Private Network (VPN) such that the same level of security is shared by all nodes that participate in the
               VPN provided that the tunnels are themselves secure.</t>

            <t>There are also additional complexities for security when any form of multicast or anycast is used because of issues
               of address assignment and the formation of security associations.</t>
          </list></t>

    </section>

    <section anchor="iana" title="IANA Considerations">

      <t>This document makes no requests for IANA action.</t>

    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">

      <t>Thanks to Stewart Bryant for useful conversations.  Luigi Iannone, Robert Raszuk, Ron Bonica,
         Marie-Jose; Montpetit, Yizhou Li, Toerless Eckert, Tony Li, Joel Halpern, and Carsten Bormann made helpful
         suggestions.  The text on Dyncast is based on suggestions from Dirk Trossen, Luigi Iannone, and Yizhou Li.
         Toerless Eckert suggested text for the multicast sections.</t>

      <t>This work is partially supported by the European Commission under Horizon 2020 grant agreement number 101015857
         Secured autonomic traffic management for a Tera of SDN flows (Teraflow).</t>

    </section>

    <section title="Contributors">

      <figure>
        <artwork align="left">
          <![CDATA[
            Joanna Dang
            Email: dangjuanna@huawei.com
          ]]>
        </artwork>
      </figure>
      <figure>
        <artwork align="left">
          <![CDATA[
            Dirk Trossen
            Email: dirk.trossen@huawei.com
          ]]>
        </artwork>
      </figure>

    </section>

  </middle>

  <back>

<!--
    <references title="Normative References">

    </references>
-->

    <references title="Informative References">

      &RFC1069;
      &RFC1112;
      &RFC1195;
      &RFC2474;
      &RFC2730;
      &RFC2776;
      &RFC2909;
      &RFC3618;
      &RFC4291;
      &RFC4607;
      &RFC4655;
      &RFC5440;
      &RFC6282;
      &RFC6308;
      &RFC6740;
      &RFC6830;
      &RFC7285;
      &RFC7450;
      &RFC7665;
      &RFC7872;
      &RFC8200;
      &RFC8279;
      &RFC8296;
      &RFC8300;
      &RFC8402;
      &RFC8596;
      &RFC8684;
      &RFC8736;
      &RFC8799;
      &RFC8754;
      &RFC8763;
      &RFC8986;
      &RFC9049;
      &RFC9098;
      &RFC9300;
      &RFC9301;

      &I-D.irtf-panrg-path-properties;
      &I-D.bonica-6man-ext-hdr-update;
      &I-D.bryant-arch-fwd-layer-ps;
      &I-D.chunduri-lsr-isis-preferred-path-routing;
      &I-D.muscariello-intarea-hicn;
      &I-D.li-dyncast-architecture;
      &I-D.liu-dyncast-ps-usecases;
      &I-D.king-rtgwg-challenges-in-routing;
      &I-D.galis-irtf-sarnet21-report;
      &I-D.lhan-satellite-semantic-addressing;
      &I-D.farrel-rtgwg-intro-to-semantic-networking;
      &I-D.boucadair-irtf-sdn-and-semantic-routing;
      &I-D.kw-rtgwg-satellite-rtg-add-challanges;

      <reference anchor="BLIND-FORWARDINGref" target="https://www.computer.org/csdl/proceedings-article/itnac/2020/09315187/1qmfFPPggrC">
        <front>
          <title>On-Demand Blind Packet Forwarding</title>
          <author initials="I." surname="Simsek">
            <organization></organization>
          </author>
        <date year="2020"/>
        </front>
        <seriesInfo name="Paper" value="30th International Telecommunication Networks and Applications Conference (ITNAC), 2020" />
      </reference>

      <reference anchor="GEO-IPref" target="https://about.att.com/ecms/dam/sites/labs_research/content/publications/AI_Geotagging_IP_Packets_for_Location.pdf">
        <front>
          <title>Geotagging IP Packets for Location-Aware Software-Defined Networking in the Presence of Virtual Network Functions</title>
          <author initials="T." surname="Dasu">
            <organization></organization>
          </author>
          <author initials="Y." surname="Kanza">
            <organization></organization>
          </author>
          <author initials="D." surname="Srivastava">
            <organization></organization>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="Paper" value="25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2017)" />
      </reference>

      <reference anchor="MULTICAST-SRref" target="https://ieeexplore.ieee.org/document/6799682">
        <front>
          <title>A Scalable Multicast Source Routing Architecture for Data Center Networks</title>
          <author initials="W." surname="Jia">
            <organization></organization>
          </author>
          <author initials="W." surname="He">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value=" IEEE Journal on Selected Areas in Communications, vol. 32, no. 1, pp. 116-123, January 2014" />
      </reference>

      <reference anchor="CONTENT-RTG-MOBILEref" target="https://ieeexplore.ieee.org/document/6799682">
        <front>
          <title>Rich Semantic Content-oriented Routing for mobile Ad Hoc Networks</title>
          <author initials="H." surname="Liu">
            <organization></organization>
          </author>
          <author initials="W." surname="He">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value="The International Conference on Information Networking (ICOIN2014), 2014" />
      </reference>

      <reference anchor="OPENSRNref" target="https://www.researchgate.net/publication/308827498_OpenSRN_A_software-defined_semantic_routing_network_architecture">
        <front>
          <title>OpenSRN: A Software-defined Semantic Routing Network Architecture</title>
          <author initials="P." surname="Ren">
            <organization></organization>
          </author>
          <author initials="X." surname="Wang">
            <organization></organization>
          </author>
          <author initials="B." surname="Zhao">
            <organization></organization>
          </author>
          <author initials="C." surname="Wu">
            <organization></organization>
          </author>
          <author initials="H." surname="Sun">
            <organization></organization>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="Paper" value="IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, 2015" />
      </reference>

      <reference anchor="ICNref" target="https://www.scopus.com/record/display.uri?eid=2-s2.0-84901242669">
        <front>
          <title>A Survey of information-centric networking research</title>
          <author initials="D." surname="Barbera">
            <organization></organization>
          </author>
          <author initials="G." surname="Xylomenos">
            <organization></organization>
          </author>
          <author initials="C." surname="Ververidis">
            <organization></organization>
          </author>
          <author initials="V." surname="Siris">
            <organization></organization>
          </author>
          <author initials="N." surname="Fotiou">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value="IEEE Communications Surveys and Tutorials, vol. 16, Iss. 2, Q2 2014" />
      </reference>

      <reference anchor="RINAref" >
        <front>
          <title>Patterns in Network Architecture: A Return to Fundamentals</title>
          <author initials="J." surname="Day">
            <organization></organization>
          </author>
          <date year="2008"/>
        </front>
        <seriesInfo name="Book" value="Prentice Hall"/>
      </reference>

      <reference anchor="SEMANTICRTG" target="https://link.springer.com/chapter/10.1007/978-3-642-14171-3_14">
        <front>
          <title>Semantic Routing for Improved Network Management in the Future Internet</title>
          <author initials="J" surname="Strassner">
            <organization></organization>
          </author>
           <author initials="K" surname="Sung-Su">
            <organization></organization>
          </author>
          <author initials="J" surname="Won-Ki">
            <organization></organization>
          </author>
          <date year="2010"/>
        </front>
        <seriesInfo name="Book Chapter" value="Springer, Recent Trends in Wireless and Mobile Networks, 2010"/>
      </reference>

      <reference anchor="EIBPref" target="https://icnp20.cs.ucr.edu/Slides/NIPAA/D-3_invited.pptx">
        <front>
          <title>Can We Improve Internet Performance? An Expedited Internet Bypass Protocol</title>
          <author initials="N." surname="Shenoy">
            <organization>Rochester Institute of Technology</organization>
          </author>
          <date year="2020"/>
        </front>
        <seriesInfo name="Presentation" value="28th IEEE International Conference on Network Protocols"/>
      </reference>

      <reference anchor="SCIONref" target="https://icnp20.cs.ucr.edu/Slides/NIPAA/D-3_invited.pptx">
        <front>
          <title>Patterns in Network Architecture: A Return to Fundamentals</title>
          <author initials="D." surname="Barbera">
            <organization></organization>
          </author>
          <author initials="L." surname="Chaut">
            <organization></organization>
          </author>
          <author initials="A." surname="Perrig">
            <organization></organization>
          </author>
          <author initials="R." surname="Reischuk">
            <organization></organization>
          </author>
          <author initials="P." surname="Szalachowski">
            <organization></organization>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="Paper" value="The ACM, vol. 60, no. 6, June 2017" />
      </reference>

      <reference anchor="RESEARCHFIAref" target="https://ieeexplore.ieee.org/document/5936152">
        <front>
          <title>A Survey of the Research on Future Internet Architectures</title>
          <author initials="J." surname="Pan">
            <organization></organization>
          </author>
          <author initials="S." surname="Paul">
            <organization></organization>
          </author>
          <author initials="R" surname="Jain">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value="IEEE Communications Magazine, vol. 49, no. 7, July 2011" />
      </reference>

      <reference anchor="PANRGref" target="https://datatracker.ietf.org/rg/panrg/about">
        <front>
          <title>Path Aware Networking Research Group</title>
          <author initials="" surname="">
            <organization></organization>
          </author>
          <date year=""/>
        </front>
        <seriesInfo name="RG" value="Path Aware Networking Research Group" />
      </reference>

      <reference anchor="ITUNET2030ref" target="https://www.itu.int/en/ITU-T/focusgroups/net2030/Documents/Network_2030_Architecture-framework.pdf">
        <front>
          <title>Network 2030 Architecture Framework</title>
          <author initials="" surname="">
            <organization></organization>
          </author>
          <date year="2020"/>
        </front>
        <seriesInfo name="Technical Specification" value="ITU-T Focus Group on Technologies for Network 2030" />
      </reference>

      <reference anchor="CONTENTref" target="https://ieeexplore.ieee.org/iel5/35/5723785/05723809.pdf">
        <front>
          <title>A survey on content-oriented networking for efficient content delivery</title>
          <author initials="J." surname="Choi">
            <organization></organization>
          </author>
          <author initials="J." surname="Han">
            <organization></organization>
          </author>
          <author initials="E" surname="Cho">
            <organization></organization>
          </author>
          <date year="2011"/>
        </front>
        <seriesInfo name="Paper" value="IEEE Communications Magazine, 49(3): 121-127, May 2011." />
      </reference>

      <reference anchor="NDNref" target="">
        <front>
          <title>Named Data Networking</title>
          <author initials="L." surname="Zhang">
            <organization></organization>
          </author>
          <author initials="A." surname="Afanasyev">
            <organization></organization>
          </author>
          <author initials="J" surname="Burke">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value="ACM SIGCOMM Computer Communication, Review 44(3): 66-73, 2014" />
      </reference>

      <reference anchor="HICNref" target="https://www.researchgate.net/publication/336344520_Enabling_ICN_in_the_Internet_Protocol_Analysis_and_Evaluation_of_the_Hybrid-ICN_Architecture">
        <front>
          <title>Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture</title>
          <author initials="G." surname="Carofiglio">
            <organization></organization>
          </author>
          <author initials="L." surname="Muscariello">
            <organization></organization>
          </author>
          <author initials="J" surname="Auge">
            <organization></organization>
          </author>
          <author initials="M" surname="Papalini">
            <organization></organization>
          </author>
          <author initials="M" surname="Sardara">
            <organization></organization>
          </author>
          <author initials="A" surname="Compagno">
            <organization></organization>
          </author>
          <date year="2019"/>
        </front>
        <seriesInfo name="Paper" value="Proceedings of the 6th ACM Conference on Information-Centric Networking, 2019." />
      </reference>

      <reference anchor="CLNPref" target="https://www.iso.org/standard/30931.html">
        <front>
          <title>Protocol for providing the connectionless-mode network service: Protocol specification - Part 1</title>
          <author initials="" surname="">
            <organization></organization>
          </author>
          <date year="1998"/>
        </front>
        <seriesInfo name="standard" value="ISO/IEC 8473-1:1998"/>
      </reference>

      <reference anchor="ISISref" target="https://standards.iso.org/ittf/PubliclyAvailableStandards/c030932_ISO_IEC_10589_2002(E).zip">
        <front>
          <title>Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction
                 with the protocol for providing the connectionless-mode network service</title>
          <author initials="" surname="">
            <organization></organization>
          </author>
          <date year="2002"/>
        </front>
        <seriesInfo name="standard" value="ISO/IEC 10589"/>
      </reference>

      <reference anchor="TERASTREAMref" target="https://ieeexplore.ieee.org/document/6596297">
        <front>
          <title>Terastream implementation of all IP new architecture</title>
          <author initials="B." surname="Zaluski">
            <organization></organization>
          </author>
          <author initials="B." surname="Rajtar">
            <organization></organization>
          </author>
          <author initials="H." surname="Habjani">
            <organization></organization>
          </author>
          <author initials="M." surname="Baranek">
            <organization></organization>
          </author>
          <author initials="N." surname="Slibar">
            <organization></organization>
          </author>
          <author initials="R." surname="Petracic">
            <organization></organization>
          </author>
           <author initials="T." surname="Sukser">
            <organization></organization>
          </author>
        <date year="2013"/>
        </front>
        <seriesInfo name="Paper" value="36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2013" />
      </reference>

      <reference anchor="MBONEref" target="https://www.savetz.com/mbone/">
        <front>
          <title>MBONE: Multicasting Tomorrow&apos;s Internet</title>
          <author initials="K." surname="Savetz">
            <organization></organization>
          </author>
          <author initials="N." surname="Randall">
            <organization></organization>
          </author>
          <author initials="Y." surname="Lepage">
            <organization></organization>
          </author>
        <date year="1996"/>
        </front>
        <seriesInfo name="Book" value="IDG" />
      </reference>

    </references>

  </back>
</rfc>
