<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-saad-mpls-miad-usecases-02" category="info">

  <front>
    <title abbrev="MNA Usecases">Use Cases for MPLS Network Action Indicators and MPLS Ancillary Data</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Juniper Networks</organization>
      <address>
        <email>tsaad@juniper.net</email>
      </address>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization>Futurewei Technologies</organization>
      <address>
        <email>kiranm@futurewei.com</email>
      </address>
    </author>
    <author initials="H." surname="Song" fullname="Haoyu Song">
      <organization>Futurewei Technologies</organization>
      <address>
        <email>haoyu.song@futurewei.com</email>
      </address>
    </author>
    <author initials="G." surname="Mirsky" fullname="Greg Mirsky">
      <organization>Ericsson</organization>
      <address>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="April" day="20"/>

    
    <workgroup>MPLS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document presents a number of use cases that have a common need for
encoding network action indicators and associated ancillary data inside MPLS packets.
There has been significant recent interest in extending the MPLS data plane to
carry such indicators and ancillary data to address a number of use cases that
are described in this document.</t>

<t>The use cases described in this document are not an exhaustive set, but rather
the ones that are actively discussed by members of the IETF MPLS, PALS and
DETNET working groups participating in the MPLS Open Design Team.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes important cases that require carrying additional
ancillary data within the MPLS packets, as well as means to indicate the
ancillary data is present, and a specific action needs to be performed on the
packet.</t>

<t>These use cases have been identified by the MPLS Working Group Open Design Team
working on defining MPLS Network Actions for the MPLS data plane. The MPLS
Ancillary Data (AD) can be classified as:</t>

<t><list style="symbols">
  <t>implicit, or “no-data” associated with a Network Action (NA) indicator,</t>
  <t>residing within the MPLS label stack and referred to as In Stack Data (ISD), and</t>
  <t>residing after the Bottom of MPLS label Stack (BoS) and referred to as Post Stack Data (PSD).</t>
</list></t>

<t>The use cases described in this document will be used to assist in
identifying requirements and issues to be considered for future resolution by
the working group.</t>

<section anchor="terminology" title="Terminology">

<t>The following terminology is used in the document:</t>

<t><list style="hanging">
  <t hangText="IETF Network Slice:"><vspace blankLines='0'/>
  a well-defined composite of a set of
endpoints, the connectivity requirements between subsets of these
endpoints, and associated requirements; the term ‘network slice’
in this document refers to ‘IETF network slice’ as defined in 
<xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>
  <t hangText="Time-Bound Networking:"><vspace blankLines='0'/>
  Networks that transport time-bounded traffic.</t>
</list></t>

</section>
<section anchor="acronyms-and-abbreviations" title="Acronyms and Abbreviations">

<t><list style='empty'>
  <t>ISD: In-stack data</t>
</list></t>

<t><list style='empty'>
  <t>PSD: Post-stack data</t>
</list></t>

<t><list style='empty'>
  <t>MNA: MPLS Network Action</t>
</list></t>

<t><list style='empty'>
  <t>NAI: Network Action Indicator</t>
</list></t>

<t><list style='empty'>
  <t>AD: Ancillary Data</t>
</list></t>

</section>
</section>
<section anchor="use-cases" title="Use Cases">

<section anchor="no-further-fastreroute" title="No Further Fastreroute">

<t>MPLS Fast Reroute (FRR) <xref target="RFC4090"/>, <xref target="RFC5286"/> and <xref target="RFC7490"/> is a useful
and widely deployed tool for minimizing packet loss in the case of a link or
node failure.</t>

<t>Several cases exist where, once FRR has taken place in an MPLS network and
resulted in rerouting a packet away from the failure, a second FRR that impacts
the same packet to rerouting  is not helpful, and may even be disruptive.</t>

<t>For example, in such a case, the packet may continue to loop until its TTL
expires.  This can lead to link congestion and further packet loss.  Thus, the
attempt to prevent a packet from being dropped may instead affect many other
packets. A proposal to address this is presented in
<xref target="I-D.kompella-mpls-nffrr"/>.</t>

</section>
<section anchor="in-situ-oam" title="In-situ OAM">

<t>In-situ Operations, Administration, and Maintenance (IOAM) may record operational
and telemetry information within the packet while the packet traverses a
particular path in a network domain.</t>

<t>The term “in-situ” refers to the fact that the IOAM data fields are added to
the data packets rather than being sent within the probe packets specifically
dedicated to OAM or Performance Measurement (PM).</t>

<t>IOAM can run in two modes Edge-to-Edge (E2E) and Hop-by-Hop (HbH).  In E2E mode,
only the encapsulating and decapsulating nodes will process IOAM data fields.
In HbH mode, the encapsulating and decapsulating nodes as well as intermediate
IOAM-capable nodes process IOAM data fields.</t>

<t>The IOAM data fields are defined in <xref target="I-D.ietf-ippm-ioam-data"/>, and can be
used for various use-cases of OAM and PM.</t>

<t><xref target="I-D.gandhi-mpls-ioam-sr"/> defines how IOAM data fields are transported using
the MPLS data plane encapsulations, including Segment Routing (SR) with MPLS
data plane (SR-MPLS).</t>

<t>The IOAM data may be added after the bottom of the MPLS label stack. The IOAM
data fields can be of fixed or incremental size as defined in
<xref target="I-D.ietf-ippm-ioam-data"/>.  <xref target="I-D.gandhi-mpls-ioam"/> describes the
applicability of IOAM to MPLS dataplane.  The encapsulating MPLS node needs to
know if the decapsulating MPLS node can process the IOAM data before adding it
in the packet. In HbH IOAM mode, nodes that are capable of processing IOAM will
intercept and process the IOAM data accordingly. The presence of IOAM header and optional IOAM 
data will betransparent to nodes that do not support or do not participate in the IOAM
process.</t>

</section>
<section anchor="network-slicing" title="Network Slicing">

<t><xref target="I-D.ietf-teas-ietf-network-slices"/> specifies the definition of 
an IETF Network Slice. It further discusses the general framework for
requesting and operating IETF Network Slices, their characteristics, and the
necessary system components and interfaces.</t>

<t>Multiple network slices can be realized on top of a single physical network.</t>

<t>In order to overcome scale challenges, IETF Network Slices may be aggregated
into groups according to similar characteristics.  The slice aggregate
<xref target="I-D.bestbar-teas-ns-packet"/> is a construct that comprises of the traffic
flows of one or more IETF Network Slices of similar characteristics.</t>

<t>A router that requires forwarding of a packet that belongs to a slice aggregate
may have to decide on the forwarding action to take based on selected
next-hop(s), and the forwarding treatment (e.g., scheduling and drop policy) to
enforce based on the associated  per-hop behavior.</t>

<t>The routers in the network that forward traffic over links that are shared by
multiple slice aggregates need to identify the slice aggregate packets
in order to enforce the associated forwarding action and treatment.</t>

<t>An IETF network slice MAY support the following key features:</t>

<t><list style="numbers">
  <t>A Slice Selector</t>
  <t>A Network Resource Partition associated with a slice aggregate.</t>
  <t>A Path selection criteria</t>
  <t>Verification that per slice Slice Level Objectives (SLOs) are being met. This may be done by active measurements
(inferred) or by using hybrid measurement methods, e.g., IOAM.</t>
  <t>Additionally, there is an on-going discussion on using Service Functions
(SFs) with network slices. This may require insertion of an NSH.</t>
  <t>For multi-domain scenarios, a packet that traverses multiple domains may
encode different identifiers within each domain.</t>
</list></t>

<section anchor="global-identifier-as-flow-aggregate-selector" title="Global Identifier as Flow-Aggregate Selector">

<t>A Global Identifier as a Flow-Aggregate Selector (G-FAS) can be encoded in the
MPLS packet as defined in <xref target="I-D.kompella-mpls-mspl4fa"/>,
<xref target="I-D.li-mpls-enhanced-vpn-vtn-id"/>, and
<xref target="I-D.decraene-mpls-slid-encoded-entropy-label-id"/>.  The G-FAS is used to
associate the packets belonging to Slice-Flow Aggregate to the underlying
Network Resource Partition (NRP) as described in
<xref target="I-D.bestbar-teas-ns-packet"/>.</t>

<t>The G-FAS can be encoded within an MPLS label carried in the packet’s MPLS label
stack. All packets that belong to the same flow aggregate MAY carry the same FAS in
the MPLS label stack.</t>

<t>When MPLS packets carry a G-FAS, MPLS LSRs use the forwarding label to select the forwarding
next-hop(s), and use the G-FAS in the MPLS packet to infer the
specific forwarding treatment that needs to be applied on the packet.</t>

</section>
<section anchor="forwarding-label-as-a-flow-aggregate-selector" title="Forwarding Label as a Flow-Aggregate Selector">

<t><xref target="RFC3031"/> states in Section 2.1 that: ‘Some routers analyze a packet’s
network layer header not merely to choose the packet’s next hop, but also to
determine a packet’s “precedence” or “class of service”’.</t>

<t>It is possible by assigning a unique MPLS forwarding label to each flow
aggregate (FEC) to distinguish the packets forwarded to the same destination.
from other flow aggregates.  In this case, LSRs can use the
top forwarding label to infer both the forwarding action and the forwarding
treatment to be invoked on the packets.</t>

</section>
</section>
<section anchor="delay-budgets-for-time-bound-applications" title="Delay Budgets for Time-Bound Applications">

<t>The routers in a network can perform two distinct functions on incoming
packets, namely forwarding (where the packet should be sent) and scheduling
(when the packet should be sent). IEEE-802.1 Time Sensitive Networking (TSN) and
Deterministic Networking provide several mechanisms for scheduling under the
assumption that routers are time-synchronized.  The most effective mechanisms
for delay minimization involve per-flow resource allocation.</t>

<t>Segment Routing (SR) is a forwarding paradigm that allows encoding forwarding
instructions in the packet in a stack data structure, rather than being
programmed into the routers.  The SR instructions are contained within a packet
in the form of a First-in First-out stack dictating the forwarding decisions of
successive routers.  Segment routing may be used to choose a path sufficiently
short to be capable of providing a bounded end-to-end latency but does
not influence the queueing of individual packets in each router along that path.</t>

<t>When carried over the MPLS data plane, a solution is required to enable the
delivery of such packets that can be delivered to their final destination by a
given time budget.</t>

<section anchor="stack-based-methods-for-latency-control" title="Stack Based Methods for Latency Control">

<t>One efficient data structure for inserting local deadlines into
the headers is a “stack”, similar to that used in Segment Routing to
carry forwarding instructions.  The number of deadline values in the
stack equals the number of routers the packet needs to traverse in
the network, and each deadline value corresponds to a specific
router.  The Top-of-Stack (ToS) corresponds to the first router’s
deadline while the Bottom-of-Stack (BoS) refers to the last’s.  All
local deadlines in the stack are later or equal to the current time
(upon which all routers agree), and times closer to the ToS are
always earlier or equal to times closer to the BoS.</t>

<t>The ingress router inserts the deadline stack into the packet headers; no other
router needs to be aware of the requirements of the time-bound flows.
Hence admitting a new flow only requires updating the information base of the
ingress router.</t>

<t>MPLS LSRs that expose the Top of Stack (ToS) label can also inspect the
associated “deadline” carried in the packet (either in MPLS stack as ISD or
after BoS as PSD).</t>

</section>
</section>
<section anchor="nsh-based-service-function-chaining" title="NSH-based Service Function Chaining">

<t><xref target="RFC8595"/> describes how Service Function Chaining (SFC) can be realized in
an MPLS network by emulating the NSH by using only MPLS label stack elements.</t>

<t>The approach in <xref target="RFC8595"/> introduces some limitations that are discussed in
<xref target="I-D.lm-mpls-sfc-path-verification"/>. This approach, however, can benefit
from the framework introduced with MNA <xref target="I-D.andersson-mpls-mna-fwk"/>.</t>

<t>For example, it may be possible to extend NSH emulation using MPLS
labels <xref target="RFC8595"></xref> to support the functionality of NSH Context Headers,
whether fixed or variable-length. One of the use cases could support Flow ID
<xref target="I-D.ietf-sfc-nsh-tlv"/> that may be used for load-balancing among
Service Function Forwarders (SFFs) and/or the Service Function (SF)
within the same SFP.</t>

</section>
<section anchor="network-programming" title="Network Programming">

<t>In SR, an ingress node steers a packet through an ordered list of instructions,
called “segments”.  Each one of these instructions represents a
function to be called at a specific location in the network.  A
function is locally defined on the node where it is executed and may
range from simply moving forward in the segment list to any complex
user-defined behavior.</t>

<t>Network Programming combines Segment Routing (SR) functions to achieve a
networking objective that goes beyond mere packet routing.</t>

<t>It may be desirable to encode a pointer to function and its arguments
within an MPLS packet transport header. For example, in MPLS we can encode the
FUNC::ARGs within the label stack or after the Bottom of Stack to support the
equivalent of FUNC::ARG in SRv6 as described in <xref target="RFC8986"/>.</t>

</section>
<section anchor="application-aware-networking" title="Application Aware Networking">

<t>Application-aware Networking (APN) as described in
<xref target="I-D.li-apn-problem-statement-usecases"/> allows application-aware information
(i.e., APN attributes) including APN identification (ID) and/or APN parameters
(e.g.  network performance requirements) to be encapsulated at network edge
devices and carried in packets traversing an APN domain.</t>

<t>The APN data is carried in packets to facilitate service provisioning, and be
used to perform fine-granularity traffic steering and network resource
adjustment. To support APN in MPLS networks, mechanisms are needed to carry
such APN data in MPLS encapsulated packets.</t>

</section>
</section>
<section anchor="co-existence-of-usecases" title="Co-existence of Usecases">

<t>Two or more of the aforementioned use cases MAY co-exist in the same packet.
This may require the presence of multiple ancilary data
(whether In-stack or Post-stack ancillary data) to be present in the same MPLS packet.</t>

<t>For example, IOAM may provide key functions along with network slicing to help
ensure that critical network slice SLOs are being met by the network provider.
In this case, IOAM is able to collect key performance measurement parameters of
network slice traffic flows as it traverses the transport network.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no IANA actions.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This document introduces no new security considerations.</t>

</section>
<section anchor="acknowledgement" title="Acknowledgement">

<t>The authors gratefully acknowledge the input of the members of the
MPLS Open Design Team.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The following individuals contributed to this document:</t>

<figure><artwork><![CDATA[
   Loa Andersson
   Bronze Dragon Consulting
   Email: loa@pi.nu

]]></artwork></figure>

</section>


  </middle>

  <back>


    <references title='Informative References'>




<reference anchor='I-D.ietf-teas-ietf-network-slices'>
   <front>
      <title>Framework for IETF Network Slices</title>
      <author fullname='Adrian Farrel'>
	 <organization>Old Dog Consulting</organization>
      </author>
      <author fullname='John Drake'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Reza Rokui'>
	 <organization>Ciena</organization>
      </author>
      <author fullname='Shunsuke Homma'>
	 <organization>NTT</organization>
      </author>
      <author fullname='Kiran Makhijani'>
	 <organization>Futurewei</organization>
      </author>
      <author fullname='Luis M. Contreras'>
	 <organization>Telefonica</organization>
      </author>
      <author fullname='Jeff Tantsura'>
	 <organization>Microsoft Inc.</organization>
      </author>
      <date day='27' month='March' year='2022'/>
      <abstract>
	 <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term &quot;IETF Network
   Slice&quot; and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slices-10'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-teas-ietf-network-slices-10.txt' type='TXT'/>
</reference>



<reference anchor='RFC4090' target='https://www.rfc-editor.org/info/rfc4090'>
<front>
<title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
<author fullname='P. Pan' initials='P.' role='editor' surname='Pan'><organization/></author>
<author fullname='G. Swallow' initials='G.' role='editor' surname='Swallow'><organization/></author>
<author fullname='A. Atlas' initials='A.' role='editor' surname='Atlas'><organization/></author>
<date month='May' year='2005'/>
<abstract><t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels.  These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t><t>Two methods are defined here.  The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair.  The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints.  Both methods can be used to protect links and nodes during network failure.  The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4090'/>
<seriesInfo name='DOI' value='10.17487/RFC4090'/>
</reference>



<reference anchor='RFC5286' target='https://www.rfc-editor.org/info/rfc5286'>
<front>
<title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
<author fullname='A. Atlas' initials='A.' role='editor' surname='Atlas'><organization/></author>
<author fullname='A. Zinin' initials='A.' role='editor' surname='Zinin'><organization/></author>
<date month='September' year='2008'/>
<abstract><t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG).  The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure.  Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5286'/>
<seriesInfo name='DOI' value='10.17487/RFC5286'/>
</reference>



<reference anchor='RFC7490' target='https://www.rfc-editor.org/info/rfc7490'>
<front>
<title>Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)</title>
<author fullname='S. Bryant' initials='S.' surname='Bryant'><organization/></author>
<author fullname='C. Filsfils' initials='C.' surname='Filsfils'><organization/></author>
<author fullname='S. Previdi' initials='S.' surname='Previdi'><organization/></author>
<author fullname='M. Shand' initials='M.' surname='Shand'><organization/></author>
<author fullname='N. So' initials='N.' surname='So'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document describes an extension to the basic IP fast reroute mechanism, described in RFC 5286, that provides additional backup connectivity for point-to-point link failures when none can be provided by the basic mechanisms.</t></abstract>
</front>
<seriesInfo name='RFC' value='7490'/>
<seriesInfo name='DOI' value='10.17487/RFC7490'/>
</reference>


<reference anchor='I-D.kompella-mpls-nffrr'>
   <front>
      <title>No Further Fast Reroute</title>
      <author fullname='Kireeti Kompella'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Wen Lin'>
	 <organization>Juniper Networks</organization>
      </author>
      <date day='12' month='July' year='2021'/>
      <abstract>
	 <t>   There are several cases where, once Fast Reroute has taken place (for
   MPLS protection), a second fast reroute is undesirable, even
   detrimental.  This memo gives several examples of this, and proposes
   a mechanism to prevent further fast reroutes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kompella-mpls-nffrr-02'/>
   <format target='https://www.ietf.org/archive/id/draft-kompella-mpls-nffrr-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-ippm-ioam-data'>
   <front>
      <title>Data Fields for In-situ OAM</title>
      <author fullname='Frank Brockners'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Shwetha Bhandari'>
	 <organization>Thoughtspot</organization>
      </author>
      <author fullname='Tal Mizrahi'>
	 <organization>Huawei</organization>
      </author>
      <date day='13' month='December' year='2021'/>
      <abstract>
	 <t>   In-situ Operations, Administration, and Maintenance (IOAM) records
   operational and telemetry information in the packet while the packet
   traverses a path in the network.  This document discusses the data
   fields and associated data types for in-situ OAM.  In-situ OAM data
   fields can be encapsulated into a variety of protocols such as NSH,
   Segment Routing, Geneve, or IPv6.  In-situ OAM can be used to
   complement OAM mechanisms based on, e.g., ICMP or other types of
   probe packets.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ippm-ioam-data-17'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ippm-ioam-data-17.txt' type='TXT'/>
</reference>


<reference anchor='I-D.gandhi-mpls-ioam-sr'>
   <front>
      <title>MPLS Data Plane Encapsulation for In-situ OAM Data</title>
      <author fullname='Rakesh Gandhi'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Zafar Ali'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Frank Brockners'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Voitek Kozak'>
	 <organization>Comcast</organization>
      </author>
      <date day='18' month='February' year='2021'/>
      <abstract>
	 <t>   In-situ Operations, Administration, and Maintenance (IOAM) records
   operational and telemetry information in the data packet while the
   packet traverses a path between two nodes in the network.  This
   document defines how IOAM data fields are transported with MPLS data
   plane encapsulation using new Generic Associated Channel (G-ACh).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-gandhi-mpls-ioam-sr-06'/>
   <format target='https://www.ietf.org/archive/id/draft-gandhi-mpls-ioam-sr-06.txt' type='TXT'/>
</reference>


<reference anchor='I-D.gandhi-mpls-ioam'>
   <front>
      <title>MPLS Data Plane Encapsulation for In-situ OAM Data</title>
      <author fullname='Rakesh Gandhi'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Zafar Ali'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Frank Brockners'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Bruno Decraene'>
	 <organization>Orange</organization>
      </author>
      <author fullname='Voitek Kozak'>
	 <organization>Comcast</organization>
      </author>
      <date day='2' month='March' year='2022'/>
      <abstract>
	 <t>   In-situ Operations, Administration, and Maintenance (IOAM) is used
   for recording and collecting operational and telemetry information
   while the packet traverses a path between two points in the network.
   This document defines how IOAM data fields are transported with MPLS
   data plane encapsulation using new Generic Associated Channel (G-ACh)
   and updates the RFC 5586.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-gandhi-mpls-ioam-04'/>
   <format target='https://www.ietf.org/archive/id/draft-gandhi-mpls-ioam-04.txt' type='TXT'/>
</reference>


<reference anchor='I-D.bestbar-teas-ns-packet'>
   <front>
      <title>Realizing Network Slices in IP/MPLS Networks</title>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Jie Dong'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Daniele Ceccarelli'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Joel Halpern'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Ran Chen'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Xufeng Liu'>
	 <organization>Volta Networks</organization>
      </author>
      <author fullname='Luis M. Contreras'>
	 <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Luay Jalil'>
	 <organization>Verizon</organization>
      </author>
      <date day='2' month='February' year='2022'/>
      <abstract>
	 <t>   Network slicing provides the ability to partition a physical network
   into multiple logical networks of varying sizes, structures, and
   functions so that each slice can be dedicated to specific services or
   customers.  Network slices need to co-exist on the same network while
   ensuring slice elasticity in terms of network resource allocation.
   The Differentiated Service (Diffserv) model allows for carrying
   multiple services on top of a single physical network by relying on
   compliant domains and nodes to provide forwarding treatment
   (scheduling and drop policy) on to packets that carry the respective
   Diffserv code point.  This document adopts a similar approach to
   Diffserv and proposes a scalable approach to realize network slicing
   in IP/MPLS networks.  The solution does not mandate Diffserv to be
   enabled in the network to provide a specific forwarding treatment,
   but can co-exist with and complement it when enabled.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-teas-ns-packet-08'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-teas-ns-packet-08.txt' type='TXT'/>
</reference>


<reference anchor='I-D.kompella-mpls-mspl4fa'>
   <front>
      <title>Multi-purpose Special Purpose Label for Forwarding Actions</title>
      <author fullname='Kireeti Kompella'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Israel Meilik'>
	 <organization>Broadcom</organization>
      </author>
      <date day='9' month='February' year='2022'/>
      <abstract>
	 <t>   The MPLS architecture introduced Special Purpose Labels (SPLs) to
   indicate special forwarding actions and offered a few simple
   examples, such as Router Alert.  In the two decades since the
   original architecture was crafted, the range, complexity and sheer
   number of such actions has grown; in addition, there now is need for
   &quot;associated data&quot; for some of the forwarding actions.  Likewise, the
   capabilities and scale of forwarding engines has also improved vastly
   over the same time period.  There is a pressing need to match the
   needs with the capabilities to deliver the next generation of MPLS
   architecture.

   In this memo, we propose an alternate mechanism whereby a single SPL
   can encode multiple forwarding actions and carry associated data,
   some in the label stack and some after the label stack.  This
   proposal also solves the problem of scarcity of base SPLs.

   This approach can immediately address several use cases:

   *  to carry a Slice Selector for IETF network slicing;

   *  to signal that further fast reroute may have harmful consequences;

   *  to indicate that there is relevant data after the label stack;

   *  among others.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kompella-mpls-mspl4fa-02'/>
   <format target='https://www.ietf.org/archive/id/draft-kompella-mpls-mspl4fa-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.li-mpls-enhanced-vpn-vtn-id'>
   <front>
      <title>Carrying Virtual Transport Network Identifier in MPLS Packet</title>
      <author fullname='Zhenbin Li'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Jie Dong'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   A Virtual Transport Network (VTN) is a virtual network which has a
   customized network topology and a set of dedicated or shared network
   resources allocated from the underlying network infrastructure.
   Multiple VTNs can be created by network operator for using as the
   underlay for one or a group of VPNs services to provide enhanced VPN
   (VPN+) services.  In packet forwarding, some fields in the data
   packet needs to be used to identify the VTN the packet belongs to, so
   that the VTN-specific processing can be executed.  In the context of
   network slicing, a VTN can be instantiated as a Network Resource
   Partition (NRP).

   This document proposes a mechanism to carry the VTN-ID in an MPLS
   packet to identify the VTN the packet belongs to.  The procedure for
   processing the VTN ID is also specified.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-li-mpls-enhanced-vpn-vtn-id-02'/>
   <format target='https://www.ietf.org/archive/id/draft-li-mpls-enhanced-vpn-vtn-id-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.decraene-mpls-slid-encoded-entropy-label-id'>
   <front>
      <title>Using Entropy Label for Network Slice Identification in MPLS networks.</title>
      <author fullname='Bruno Decraene'>
	 <organization>Orange</organization>
      </author>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Wim Henderickx'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Luay Jalil'>
	 <organization>Verizon</organization>
      </author>
      <date day='11' month='February' year='2022'/>
      <abstract>
	 <t>   This document defines a solution to encode a slice identifier in MPLS
   in order to distinguish packets that belong to different slices, to
   allow enforcing per network slice policies (.e.g, Qos).

   The slice identification is independent of the topology.  It allows
   for QoS/DiffServ policy on a per slice basis in addition to the per
   packet QoS/DiffServ policy provided by the MPLS Traffic Class field.

   In order to minimize the size of the MPLS stack and to ease
   incremental deployment the slice identifier is encoded as part of the
   Entropy Label.

   This document also extends the use of the TTL field of the Entropy
   Label in order to provide a flexible set of flags called the Entropy
   Label Control field.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-decraene-mpls-slid-encoded-entropy-label-id-03'/>
   <format target='https://www.ietf.org/archive/id/draft-decraene-mpls-slid-encoded-entropy-label-id-03.txt' type='TXT'/>
</reference>



<reference anchor='RFC3031' target='https://www.rfc-editor.org/info/rfc3031'>
<front>
<title>Multiprotocol Label Switching Architecture</title>
<author fullname='E. Rosen' initials='E.' surname='Rosen'><organization/></author>
<author fullname='A. Viswanathan' initials='A.' surname='Viswanathan'><organization/></author>
<author fullname='R. Callon' initials='R.' surname='Callon'><organization/></author>
<date month='January' year='2001'/>
<abstract><t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3031'/>
<seriesInfo name='DOI' value='10.17487/RFC3031'/>
</reference>



<reference anchor='RFC8595' target='https://www.rfc-editor.org/info/rfc8595'>
<front>
<title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
<author fullname='A. Farrel' initials='A.' surname='Farrel'><organization/></author>
<author fullname='S. Bryant' initials='S.' surname='Bryant'><organization/></author>
<author fullname='J. Drake' initials='J.' surname='Drake'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack.  That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack.  This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='8595'/>
<seriesInfo name='DOI' value='10.17487/RFC8595'/>
</reference>


<reference anchor='I-D.lm-mpls-sfc-path-verification'>
   <front>
      <title>MPLS-based Service Function Path(SFP) Consistency Verification</title>
      <author fullname='Liu Yao'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Greg Mirsky'>
	 <organization>ZTE Corporation</organization>
      </author>
      <date day='21' month='February' year='2021'/>
      <abstract>
	 <t>   This document describes extensions to MPLS LSP ping mechanisms to
   support verification between the control/management plane and the
   data plane state for SR-MPLS service programming and MPLS-based NSH
   SFC.

   This document defines the signaling of the Generic Associated Channel
   (G-ACh) over a Service Function Path (SFP) with an MPLS forwarding
   plane using the basic unit defined in RFC 8595.  The document updates
   RFC 8595 in respect to SFF&#39;s handiling TTL expiration.  The document
   also describes the processing of the G-ACh by the elements of the
   SFP.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-lm-mpls-sfc-path-verification-02'/>
   <format target='https://www.ietf.org/archive/id/draft-lm-mpls-sfc-path-verification-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.andersson-mpls-mna-fwk'>
   <front>
      <title>MPLS Network Actions Framework</title>
      <author fullname='Loa Andersson'>
	 <organization>Bronze Dragon Consulting</organization>
      </author>
      <author fullname='Stewart Bryant'>
	 <organization>University of Surrey 5GIC</organization>
      </author>
      <author fullname='Matthew Bocci'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Tony Li'>
	 <organization>Juniper Networks</organization>
      </author>
      <date day='4' month='April' year='2022'/>
      <abstract>
	 <t>   This document specifies an architectural framework for the MPLS
   Network Actions (MNA) technologies.  MNA technologies are used to
   indicate actions for Label Switched Paths (LSPs) and/or packets and
   to transfer data needed for these actions.

   The document describes a common set of protocol actions and
   information elements supporting additional operational models and
   capabilities of MPLS networks.  Some of these actions are defined in
   existing MPLS specifications, while others require extensions to
   existing specifications to meet the requirements found in
   &quot;Requirements for MPLS Label Stack Indicators and Ancillary Data&quot;.

   This document is the result of work started in MPLS Open Desgign
   Team, with participation by the MPLS, PALS and DETNET working groups.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-andersson-mpls-mna-fwk-00'/>
   <format target='https://www.ietf.org/archive/id/draft-andersson-mpls-mna-fwk-00.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-sfc-nsh-tlv'>
   <front>
      <title>Network Service Header (NSH) Metadata Type 2 Variable-Length Context Headers</title>
      <author fullname='Yuehua Wei'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Uri Elzur'>
	 <organization>Intel</organization>
      </author>
      <author fullname='Sumandra Majee'>
	 <organization>Individual contributor</organization>
      </author>
      <author fullname='Carlos Pignataro'>
	 <organization>Cisco</organization>
      </author>
      <author fullname='Donald E. Eastlake'>
	 <organization>Futurewei Technologies</organization>
      </author>
      <date day='20' month='April' year='2022'/>
      <abstract>
	 <t>   Service Function Chaining (SFC) uses the Network Service Header (NSH)
   (RFC 8300) to steer and provide context Metadata (MD) with each
   packet.  Such Metadata can be of various Types including MD Type 2
   consisting of variable length context headers.  This document
   specifies several such context headers that can be used within a
   service function path.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sfc-nsh-tlv-15'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-sfc-nsh-tlv-15.txt' type='TXT'/>
</reference>



<reference anchor='RFC8986' target='https://www.rfc-editor.org/info/rfc8986'>
<front>
<title>Segment Routing over IPv6 (SRv6) Network Programming</title>
<author fullname='C. Filsfils' initials='C.' role='editor' surname='Filsfils'><organization/></author>
<author fullname='P. Camarillo' initials='P.' role='editor' surname='Camarillo'><organization/></author>
<author fullname='J. Leddy' initials='J.' surname='Leddy'><organization/></author>
<author fullname='D. Voyer' initials='D.' surname='Voyer'><organization/></author>
<author fullname='S. Matsushima' initials='S.' surname='Matsushima'><organization/></author>
<author fullname='Z. Li' initials='Z.' surname='Li'><organization/></author>
<date month='February' year='2021'/>
<abstract><t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t><t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t><t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t></abstract>
</front>
<seriesInfo name='RFC' value='8986'/>
<seriesInfo name='DOI' value='10.17487/RFC8986'/>
</reference>


<reference anchor='I-D.li-apn-problem-statement-usecases'>
   <front>
      <title>Problem Statement and Use Cases of Application-aware Networking (APN)</title>
      <author fullname='Zhenbin Li'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Shuping Peng'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Daniel Voyer'>
	 <organization>Bell Canada</organization>
      </author>
      <author fullname='Chongfeng Xie'>
	 <organization>China Telecom</organization>
      </author>
      <author fullname='Peng Liu'>
	 <organization>China Mobile</organization>
      </author>
      <author fullname='Zhuangzhuang Qin'>
	 <organization>China Unicom</organization>
      </author>
      <author fullname='Gyan Mishra'>
	 <organization>Verizon Inc.</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   Network operators are facing the challenge of providing better
   network services for users.  As the ever-developing 5G and industrial
   verticals evolve, more and more services that have diverse network
   requirements such as ultra-low latency and high reliability are
   emerging, and therefore differentiated service treatment is desired
   by users.  On the other hand, as network technologies such as
   Hierarchical QoS (H-QoS), SR Policy, and Network Slicing keep
   evolving, the network has the capability to provide more fine-
   granularity differentiated services.  However, network operators are
   typically unware of the applications that are traversing their
   network infrastructure, which means that not very effective
   differentiated service treatment can be provided to the traffic
   flows.  As network technologies evolve including deployments of IPv6,
   SRv6, Segment Routing over MPLS dataplane, the programmability
   provided by IPv6 and Segment Routing can be augmented by conveying
   application related information into the network satifying the fine-
   granularity requirements.

   This document analyzes the existing problems caused by lack of
   service awareness, and outlines various use cases that could benefit
   from an Application-aware Networking (APN) framework.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-li-apn-problem-statement-usecases-06'/>
   <format target='https://www.ietf.org/archive/id/draft-li-apn-problem-statement-usecases-06.txt' type='TXT'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

