<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-shi-cats-ipv6-based-con-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="IPv6 based CON">IPv6-based Cloud-Oriented Networking</title>
    <seriesInfo name="Internet-Draft" value="draft-shi-cats-ipv6-based-con-01"/>
    <author initials="H." surname="Shi" fullname="Hang Shi">
      <organization>Huawei Technologies</organization>
      <address>
        <email>shihang9@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Li" fullname="Cheng Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="04"/>
    <area>Routing</area>
    <workgroup>Computing-Aware Traffic Steering</workgroup>
    <abstract>
      <?line 76?>

<t>This document describes the scenarios, requirements and technologies
for IPv6-based Cloud-oriented Networking.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Computing-Aware Traffic Steering Working Group mailing list (cats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/VMatrix1900/draft-cats-ipv6-based-con"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the development of cloud computing, increasing services have
been migrated from enterprises to cloud data centers. Compared with
interconnections between branches and headquarters, new connections
between enterprise sites to cloud data centers and inter-cloud are
added, which bring new requirements and challenges for existing
networks.</t>
      <t>When enterprises have workloads &amp; applications &amp; data split
among different data centers, especially for those enterprises with
multiple sites that are already interconnected by VPNs (e.g., MPLS
L2VPN/L3VPN), challenges are introduced.
<xref target="I-D.ietf-rtgwg-net2cloud-problem-statement"/> describes the
problems that enterprises face today when interconnecting their branch
offices with dynamic workloads in third party data centers (a.k.a. Cloud
DCs).</t>
      <t>SD-WAN is a flexible WAN architecture that enables flexible
network-to-cloud and inter-clouds connections. It supports to use
alternative paths like internet or 4G / 5G connection instead of
expensive MPLS leased lines to exchange data between sites and clouds.
However, when a WAN path travels multiple MPLS domains, the
configurations are complicated due to multiple services touch points
need to be configured. Therefore, it is hard to support end-to-end path
programming in IPv4/MPLS based SD-WAN.</t>
      <t>When using VXLAN in SD-WAN, only the overlay path or anchor points
can be specified while the underlay forwarding path can not be
specified. Therefore, strict TE requirements like deterministic delay,
specified path forwarding can not be satisfied.</t>
      <t>In order to resolve these challenges, this document propose
IPv6-based Cloud-Oriented Networking (CON). In addition, it describes
the challenges for existing networks when clouds and networks are
converged, requirements that IPv6-based CON should satisfy, and the
solutions in IPv6-based CON that satisfy the requirements.</t>
      <t>IPv6-based CON supports quick and flexible connections between sites
and clouds and inter-clouds, it also supports end-to-end path
programming, which can be used for many use cases, such as strict path
traffic engineering, deterministic delay forwarding, and service
function chaining, to provide better network services for cloud-network
and inter-cloud interconnections.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="RFC8754"/> and <xref target="RFC8200"/>,
and the reader is assumed to be familiar with that terminology.
This document introduces the following terms:</t>
      <t>POP: Point of Presence</t>
      <t>CON: Cloud-Oriented Networking.</t>
      <t>EC: Edge Computing.</t>
      <t>EDC: Edge Data center</t>
      <t>RDC: Regional Data Center</t>
      <t>CDC: Core Data Center</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>As development of cloud, many clouds have been deployed, such as
Private cloud, Public Cloud, and Hybrid Cloud. The cloud services can be
provided by a third party, such as an OTT (Over-The-Top) content
provider, and it can be provided by a network operator as well.
Furthermore, cloud can be deployed not only in IT data centers but also
CT data centers.</t>
      <t>With the development and successful application of cloud native
design in the IT field and Network Functions Virtualization (NFV)
technologies, virtualization and cloudification have gradually matured
and evolved to provide a new level of productivity, offering a new
approach to telecom network construction. Building cloud-based telecom
networks (also known as telco clouds) becomes a new way of telecom
network construction.</t>
      <t>In order to support low latency communication, the request should be
responded at the near cloud data center, therefore edge computing data
center (a.k.a Edge Cloud) is introduced. Telecommunication services and
third-party OTT services can be deployed in the edge cloud.</t>
      <t>As the deployment of clouds, the traffic pattern in the network has
changed significantly, which results in new challenges for existing
networks.</t>
      <section anchor="underlay">
        <name>Underlay</name>
        <t>From the aspect of underlay, cloud services requires the network to
provide quick and flexible connection.</t>
        <t>The typical topology of telco cloud is shown in figure 1.</t>
        <artwork><![CDATA[
              +++++++        +++++++            ++++++
              | EDC |        | RDC |            | CDC|
              +++++++        +++++++            ++++++
                 |   *********  |   ************  |
                 |   *       *  |   *          *  |
   OLT/CSG/CPE---PE--* Metro *--PE--* Backbone *--PE--IGW---Internet
                     *       *      *          *
                     *********      ************

            Figure 1.Typical topology of telco cloud

]]></artwork>
        <t>The edge cloud is deployed in edge data center (EDC) in the access
network usually, so that the servers in the edge cloud can respond to
the delay-sensitive requests rapidly, like 5G URLLC traffic. The
traffic is not delay-sensitive can be responded in regional cloud DC,
which is located in the metro or core network. Most cloud services may
be deployed in the core cloud DC considering reducing the cost, which
is far from the end user. Like, the UPF may locate in the regional
cloud DC or Core cloud DC, so that it can support more users.</t>
        <t>The traffic from end users to cloud servers are forwarded along
with different paths due to the different locations of the end users
and the cloud servers.</t>
        <t>In addition, when deploying new services, for instance, deploying a
leased line from an enterprise site to a cloud data center, it will
take probably weeks in the current IPv4/MPLS carrier network. Because
the VPN configuration is needed to be done at multiple PE nodes if the
leased line travels multiple domains (when using Option A between
domains). Also, the cloud operator needs to negotiate with network
operators if the cloud services and the network services are provided
by different operators. For example, thousands of chain stores such as
grocery stores or super markets are needed to connect to their
enterprise VPNs, and they may use the cloud services. However, in
IPv4/MPLS network, it may take weeks to establish a new VPN connection
from a site to headquarter or cloud tenant networks.</t>
        <t>Furthermore, different traffic of different enterprise/tenant/users
are treated differently in clouds, and they <bcp14>MAY</bcp14> be forwarded along
with different service function chains (SFC). However, it is hard to
support SFC in IPv4 or MPLS based network in carrier's networks or
data center networks. Normally, to support SFC, the traffic steering
policies are configured at multiple nodes along the SFC path, which is
complicated.</t>
      </section>
      <section anchor="overlay">
        <name>Overlay</name>
        <t>In order to provide quick and flexible cloud connection, overlay
connection is provided by cloud providers, especially the OTT cloud
providers.</t>
        <t>SD-WAN is a typical fabric for DCI connection between clouds and
sites, which provides a cheaper and smarter WAN connection. Many
SD-WAN providers builds their own WAN backbone network by connecting
their POP GWs to provide better SLA assurance for tenants. The typical
topology of SD-WAN with POP GWs is shown in figure 2.</t>
        <artwork><![CDATA[
  Site CPE1--POP GW1 --------------------------POP GW2---Site CPE2
                |                                 |
                |          SD-WAN Backbone        |
                |                                 |
    Cloud1---POP GW3---------------------------POP GW4--Cloud2

              Figure 2. Typical topology of SD-WAN

]]></artwork>
        <t>Currently, the traffic from the CPE to POP GW is forwarded through
the shortest forwarding path over the Internet, or an MPLS tunnel.</t>
        <t>In addition, traffic from POP GW to another POP GW can be forwarded
along with the MPLS tunnel that is a leased line, or over the
internet, depending on the forwarding policies.</t>
        <t>When the traffic is forwarded over the internet, it can be
forwarded over a VXLAN tunnel. However, when using VXLAN, only the
overlay connection is provided to enterprises/tenants, while the
underlay forwarding path can not be specified and programmed.
Therefore the SLA requirements can not be guaranteed when the traffic
is forwarded overlay.</t>
      </section>
    </section>
    <section anchor="ipv6-based-cloud-oriented-networking">
      <name>IPv6-based Cloud-Oriented Networking</name>
      <t>This document describes a networking architecture called IPv6-based
Cloud-Oriented Networking (CON). IPv6-based CON is an IPv6-based
networking which provide quick, flexible connection to support dynamic
site to cloud, and inter-cloud connections. Also, it supports end-to-end
underlay forwarding path programming, so that services like strict path
TE and SFC can be supported better.</t>
      <t>The following section describes the requirements in IPv6-based CON,
and the related solutions that meet the requirements.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>This section describes the overall requirements which need to be
fulfilled by IPv6-based Cloud-Oriented Networking.</t>
        <section anchor="quick-connection">
          <name>Quick Connection</name>
          <t>Enterprise sites can locate at any location around the world,
they need to connect to the clouds or other sites in any time, from
any where. Also, enterprises may have some Virtual Private Clouds
(VPC) in different clouds, they need to connect to each other in
real time as well. The servers may locate in different cloud data
centers or enterprise sites, which provide services for employees or
other users. Therefore quick connection is required in IPv6-based
CON.</t>
        </section>
        <section anchor="hybrid-network-connection">
          <name>Hybrid Network Connection</name>
          <t>The enterprise VPN traffic can be forwarded around the world,
which may travel heterogeneous networks, such as IPv4, MPLS and
IPv6.</t>
          <t>Typically, when a SD-WAN network connects multiple sites and
clouds, it may cover hybrid networks. For example, the sub-path from
the CPE to POP WG could be an IPv4 sub-path without any resource
guarantee. The sub-path between POP GWs could be an MPLS LSP with
resource reservation.</t>
          <t>Therefore, connection over hybrid networks <bcp14>MUST</bcp14> be supported in
IPv6-based CON.</t>
        </section>
        <section anchor="path-programming">
          <name>Path Programming</name>
          <t>When the enterprise VPN traffic is forwarded among sites or
clouds, it may be forwarded along different paths. Each path has
different performance such as different bandwidth, delay, etc. For
instance, path A is the shortest path from site 1 to cloud 1, which
has the lowest delay, while the path B can provide more bandwidth
than path A. Therefore, the delay-sensitive traffic like PC gaming
traffic <bcp14>SHOULD</bcp14> be forwarded along with path A, and the traffic that
is delay-insensitive but requiring large bandwidth <bcp14>SHOULD</bcp14> be
forwarded along with path B.</t>
          <t>In order to meet the different SLA requirements, IPv6-based CON
<bcp14>MUST</bcp14> support path programming.</t>
        </section>
        <section anchor="resource-assurance">
          <name>Resource Assurance</name>
          <t>In RSVP-TE MPLS, resources like bandwidth can be reserved for an
LSP. When the traffic is forwarded along the LSP, the bandwidth can
be guaranteed, which makes sure that the traffic will not be
affected by other traffic. In order to provide SLA guaranteed
services, IPv6-based CON <bcp14>MUST</bcp14> support Resource Assurance.</t>
          <t>Network slicing is an approach to provide separate and
independent end-to-end logical network over the physical network
infrastructure. Each Network Slicing has its own resources, which
can meet the specific SLA requirements. In order to provide SLA
guaranteed services, IPv6-based CON <bcp14>MUST</bcp14> support network
slicing.</t>
        </section>
        <section anchor="deterministic-delay">
          <name>Deterministic Delay</name>
          <t>Delay-sensitive traffic has the strict requirements of network
delay. Especially, when the servers moved to clouds instead of
locating locally within the enterprise site, the long physical
distance of packet forwarding path will introduce larger delay. In
the traditional network, the shortest forwarding path is calculated
based on the metric, and the metric is usually associated to the
physical hops instead of latency. However, minimum delay forwarding
is required for delay-sensitive traffic, like real-time video
broadcast and video meeting.</t>
          <t>Therefore, IPv6-based CON <bcp14>MUST</bcp14> have the capability to support
path computing based on delay. Also, it <bcp14>MUST</bcp14> be able to provide
deterministic delay forwarding.</t>
        </section>
        <section anchor="service-function-chaining">
          <name>Service Function Chaining</name>
          <t>Service Function Chaining <xref target="RFC7665"/> is a mechanism
to provide different value-added services (VAS) for packets.</t>
          <t>A service function chain defines an ordered set of abstract
service functions and ordering constraints that must be applied to
packets and/or frames and/or flows selected as a result of
classification <xref target="RFC7665"/>.</t>
          <t>An example of an abstract service function is "a firewall".
Typically, different tenant's traffic in cloud data center will
traverse different services function chain containing Firewall, DPI
or other VAS.</t>
          <t>Therefore, IPv6-based CON <bcp14>MUST</bcp14> have the capability to support
SFC.</t>
        </section>
        <section anchor="performance-measurement">
          <name>Performance Measurement</name>
          <t>Many OAM mechanisms are used to support network operation.
Performance Measurement (PM) is one of the most important part of
OAM. With PM, the real-time QoS of the forwarding path, like delay,
packet loss ratio and throughput, can be measured.</t>
          <t>PM can be implemented in one of three ways: active, passive, or
hybrid <xref target="RFC7799"/>, differing in whether OAM packets
need to be proactively sent.</t>
          <t>On-path telemetry <xref target="I-D.song-opsawg-ifit-framework"/> is an hybrid mode
OAM/PM mechanism, which provides better accuracy than active PM.
Therefore, on-path Performance Measurement <bcp14>MUST</bcp14> be supported in
IPv6-based CON.</t>
        </section>
        <section anchor="reliability">
          <name>Reliability</name>
          <t>In Cloud-Network Interconnection scenarios, the enterprise
traffic is forwarded over the WAN paths. The traffic can be
sensitive to delay or packet losing, so high reliability is required
in these scenarios. Therefore, protection of node and links <bcp14>MUST</bcp14> be
supported in IPv6-based CON. Furthermore, redundancy transmission
<bcp14>SHOULD</bcp14> be supported.</t>
        </section>
        <section anchor="security">
          <name>Security</name>
          <t>As mentioned above, the enterprise traffic is forwarded over the
WAN paths in IPv6-based CON. The security of the traffic <bcp14>MUST</bcp14> be
ensured.</t>
          <t>Also, in SD-WAN scenarios, customers are most concerned about
security.</t>
          <t>Therefore, IPv6-based CON <bcp14>MUST</bcp14> support secure connection, and
<bcp14>MUST</bcp14> provide security assurance for the traffic in transmission.</t>
        </section>
        <section anchor="forwarding-efficiency">
          <name>Forwarding Efficiency</name>
          <t>Tenants/Customers rent the physical or logical WAN links/paths
from network operators for building they cloud-network
interconnection enterprise network, so the forwarding efficiency is
important for the WAN path tenant.</t>
          <t>Path Maximum Transmission Unit indicates the maximum size of a
packet that it can be forwarded along a path. Setting an appropriate
PMTU for packets can avoid fragmentation or dropping, so that the
forwarding efficiency can be raised.</t>
          <t>Also, the overhead of packets <bcp14>MUST</bcp14> be added very carefully since
it affects the forwarding efficiency directly. Especially, when many
SIDs are inserted in an SRv6 packet, the overhead of the SID list is
too large. <xref target="I-D.srcompdt-spring-compression-requirement"/> describes the
requirements of SRv6 compression.</t>
          <t>Therefore, the IPv6-based CON <bcp14>MUST</bcp14> support PMTU probing and
configuration. In addition, it <bcp14>MUST</bcp14> support SRv6 compression.</t>
        </section>
        <section anchor="application-aware-networking">
          <name>Application-Aware Networking</name>
          <t>Network operators are typically unaware of which applications are
traversing their networks, which is because the network layer is
decoupled from application layer. Adding application knowledge to
the network layer enables finer granularity requirements of
applications to be specified to the network operator. As IPv6 is
being widely deployed, the programmability provided by IPv6
encapsulations can be augmented by conveying application
information.</t>
          <t>In IPv6-based CON, many types of applications' traffic is
exchanged between sites and clouds. They have various requirements
of QoS, and should be treated differently. In order to provide finer
granularity traffic engineering to reduce the cost of WAN services,
application-aware networking <bcp14>SHOULD</bcp14> be supported in IPv6-based
CON.</t>
        </section>
      </section>
      <section anchor="solutions">
        <name>Solutions</name>
        <t>This section describes the candidate solutions that meet the
requirements in IPv6-based CON.</t>
        <section anchor="vpn">
          <name>VPN</name>
          <t>VPN is a basic and essential services for cloud-networks
interconnections.</t>
          <t>SRv6 supports VPN by encoding the VPN information into the VPN
SID <xref target="RFC8986"/>.</t>
          <t>Based on IPv6, SRv6 VPN can be established across multiple
domains. It avoids configuring VPN services at each boundary nodes
at each domain like the way in IPv4/MPLS networks (Option A).
Deploying VPN based on SRv6 can shorten the duration
significantly.</t>
          <t>Also, L2VPN and L3VPN can be supported uniformly based on EVPN
control plane <xref target="RFC9252"/>.
Therefore, combining the SRv6 data plane and EVPN control plane, the
VPN can be deployed in an easy and flexible way in IPv6-based
CON.</t>
        </section>
        <section anchor="path-programming-1">
          <name>Path Programming</name>
          <t>Based on SRv6, the traffic forwarding path can be programmed at
the ingress of the SRv6 domain, so that the traffic from sites to
clouds or inter-cloud can be forwarded through the specific underlay
path.</t>
          <t>For instance, in SD-WAN scenarios, the POP GW can choose a
specific underlay forwarding path in WAN by choosing a binding SID
<xref target="I-D.dukes-spring-sr-for-sdwan"/>.
If the CPE supports SRv6, a controller can convey the programmed path
information to the CPE via BGP SRv6 policy
<xref target="I-D.ietf-idr-segment-routing-te-policy"/> or PCEP SRv6 policy
<xref target="I-D.ietf-pce-segment-routing-policy-cp"/>.</t>
          <t>If the WAN connection travels multiple domains, the WAN path can
be connected by multiple tunnels, such as VXLAN, GRE tunnel.
<xref target="I-D.dunbar-sr-sdwan-over-hybrid-networks"/> describes how to associated
the tunnels.</t>
          <t>In order to shorten the delay, a CPE or PE can choose the nearest
server in a specific cloud, and forward the packets through
programmed paths.</t>
        </section>
        <section anchor="service-function-chaining-1">
          <name>Service Function Chaining</name>
          <t>SFC is required in IPv6-based CON since different tenants
subscribe different value-added services.</t>
          <t><xref target="I-D.ietf-spring-sr-service-programming"/> defines
the mechanism to support SFC in SRv6. Each service function (SF) can
be represented as an SRv6 SID if it supports SRv6. If the SF is
SRv6-unaware device, then proxy SID is used. By programming service
SIDs into the SRH, the SFC can be supported in SRv6.</t>
          <t>Thanks to IPv6 reachability, SRv6 supports to program the
end-to-end forwarding path from the carrier network to the inside
the cloud data center, even to multiple clouds.</t>
          <t>If NSH-based SFC has been deployed, a transition solution should
be considered, and <xref target="I-D.ietf-spring-nsh-sr"/> describes
a NSH and SR integration SFC solution.</t>
        </section>
        <section anchor="ipv6-based-network-slicing">
          <name>IPv6 based Network Slicing</name>
          <t>The tenant traffic <bcp14>MUST</bcp14> be isolated in WAN to avoid affecting by
other internet traffic.</t>
          <t>A framework, Enhanced VPN (VPN+), to form an enhanced
connectivity services between customer sites is defined as per
<xref target="I-D.ietf-teas-enhanced-vpn"/>. Typically, VPN+ will be used
to form the underpinning of network slicing. It also defines Virtual
Transport Network (VTN). A VTN is a virtual underlay network that
connects customer edge points with the capability of providing the
isolation and performance characteristics required by an enhanced
VPN customer. A VTN usually has a customized topology and a set of
dedicated or shared network resources <xref target="I-D.ietf-teas-enhanced-vpn"/>.</t>
          <t>A VTN-ID option in IPv6 HBH header is defined in
<xref target="I-D.dong-6man-enhanced-vpn-vtn-id"/> to identify the Virtual
Transport Network (VTN) the packet belongs to. A VTN can be used as
the underlay for one or a group of VPNs to provide enhanced VPN
(VPN+) services.</t>
          <t>By using VTN-ID, an end-to-end IPv6 network slicing is identified
in transport network. Tenant traffic in WAN can be forwarded in the
VTN with guaranteed resource.</t>
        </section>
        <section anchor="ipv6-based-on-path-measurement">
          <name>IPv6-based On-path Measurement</name>
          <t>The extension of supporting Alternate Marking Method <xref target="RFC9341"/> in IPv6
is defined in <xref target="RFC9343"/>. It describes how the
Alternate Marking Method to be used as the hybrid performance
measurement tool in an IPv6 domain by defining a new Extension
Header Option.</t>
          <t>Alternate Marking Method is a hybrid on-path performance
measurement method, and the metadata of each node can be collected
by the collector to compute the performance of the path.</t>
          <t>IOAM is another on-path measurement method.
<xref target="I-D.ietf-ippm-ioam-ipv6-options"/> defines a new IPv6
option, called IOAM option to support carrying IOAM metadata in the
IPv6 data packet. However, carrying all the metadata in the data
packet will bring challenges for hardware processing. For instance,
long-length metadata may cause recircle in processing. Therefore,
<xref target="RFC9326"/> defines a direct
export option in IOAM, which enables the nodes to export the
metadata to collector directly. Furthermore,
<xref target="I-D.song-opsawg-ifit-framework"/> outlines a high-level
framework to provide an operational environment that utilizes
existing and emerging on-path telemetry techniques to enable the
collection and correlation of performance information from the
network.</t>
        </section>
        <section anchor="reliability-1">
          <name>Reliability</name>
          <section anchor="local-protection">
            <name>Local Protection</name>
            <t>Local protection mechanisms like Fast Reroute (FRR) provide 50
ms protection on nodes for traffic.</t>
            <t>Regarding link failures, TI-LFA <xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/>
provides a fast
reroute mechanism by sending the traffic to an expected
post-convergence paths from the point of local repair.</t>
            <t>Regarding the middle endpoint node failures,
<xref target="I-D.hu-spring-segment-routing-proxy-forwarding"/> defines
a mechanism for fast reroute protection against the failure of a
SR-TE path. It can provide fast reroute protection for an
adjacency segment, a node segment and a binding segment of the
path. Also, <xref target="I-D.chen-rtgwg-srv6-midpoint-protection"/> defines
midpoint protection, which enables the direct neighbor of the
failed endpoint to perform the function of the endpoint, replace
the IPv6 destination address to the next endpoint, and choose the
next hop based on the new destination address.</t>
            <t>Regarding the egress node failures,
<xref target="I-D.ietf-rtgwg-srv6-egress-protection"/> defines a local
protection solution using the mirror SID.</t>
          </section>
          <section anchor="end-to-end-protection">
            <name>End-to-End Protection</name>
            <t>End-to-End Protection is also required in IPv6-based CON.
Normally, host-standby nodes are deployed for supporting traffic
switching from the failed node to the alternative node. In order
to detect the failure, End-to-end BFD is required. Once the BFD
session is failed, the traffic can be steered into a disjoint
forwarding path, and the traffic will be forwarded to the
host-standby node.</t>
          </section>
          <section anchor="redundancy-protection">
            <name>Redundancy Protection</name>
            <t>In order to avoid losing packets,
<xref target="I-D.geng-spring-sr-redundancy-protection"/> defines a
redundancy transmission solution.</t>
            <t>The document defines two types of segment including Redundancy
Segment and Merging Segment to empower the Segment Routing with
the capability of redundancy protection.</t>
          </section>
        </section>
        <section anchor="security-1">
          <name>Security</name>
          <t>As per <xref target="I-D.li-spring-srv6-security-consideration"/>, SRv6 inherits
potential security vulnerabilities from Source Routing and IPv6, but
it does not introduce new critical security threats.</t>
          <t>Regarding a limited domain, SPRING architecture <xref target="RFC8402"/> defines clear
trusted domain boundaries so that
source-routing information is only available within the trusted
domain and never exposed to the outside of the domain. It is
expected that, by default, explicit routing is only used within the
boundaries of the administered domain. Therefore, the data plane
does not expose any source-routing information when a packet leaves
the trusted domain. The traffic is filtered at the domain boundaries
<xref target="RFC8402"/>.</t>
          <t>However, it has been noted that the AH and ESP are not directly
applicable in order to reduce the vulnerabilities of SRv6 due to the
presence of mutable fields in the SRH
<xref target="I-D.li-spring-srv6-security-consideration"/>. In order to
resolve this problem, <xref target="RFC8754"/> defines a mechanism
to carry HMAC TLV in the SRH to verify the integrity of packets
including the SRH fields.</t>
          <t>Regarding end-to-end security protection across multiple domains,
an end-to-end IPSec tunnel is suggested to be deployed.</t>
          <t>In typical SD-WAN scenarios, the IPSec tunnel should be used
between the CPE and POP GW.</t>
        </section>
        <section anchor="ipv6-forwarding-efficiency">
          <name>IPv6 Forwarding Efficiency</name>
          <section anchor="pmtu">
            <name>PMTU</name>
            <t>The host may discover the PMTU by Path MTU Discovery (PMTUD) <xref target="RFC8201"/>
or other means. But the ingress node
still needs to examine the packet size to drop too large packets
to avoid malicious packets or error packets attack. Also, the
packet size may exceed the PMTU because of the new encapsulation
of SR-MPLS or SRv6 at the ingress. In order to check whether the
packet size exceeds the PMTU or not, the ingress node need to know
the Path MTU associated to the forwarding path.</t>
            <t>However, the path maximum transmission unit (MTU) information
for SR path is not available since the SR does not require
signaling. <xref target="I-D.ietf-idr-bgp-ls-link-mtu"/> proposes
a BGP-LS extensions to collect the link MTU of the links in the
networks. <xref target="I-D.ietf-idr-sr-policy-path-mtu"/> and <xref target="I-D.li-pce-pcep-pmtu"/>
defines extensions to
distribute path MTU information within BGP and PCEP SR policies,
respectively. In this way, the controller can compute the
appropriate PMTU for an SR path.</t>
          </section>
          <section anchor="srv6-compression">
            <name>SRv6 Compression</name>
            <t>The overhead of SRv6 encapsulation brings challenges for
hardware processing and transmission.
<xref target="I-D.srcompdt-spring-compression-requirement"/> describes
the requirements of SRv6 compression.</t>
            <t>G-SRv6 is proposed in <xref target="I-D.cl-spring-generalized-srv6-np"/>, which
supports to encode multiple types of SIDs in SRH. This SRH is called
Generalized SRH <xref target="I-D.lc-6man-generalized-srh"/> while
the SID is called Generalized SID.</t>
            <t>G-SRv6 supports to encode the compressed SIDs in the SRH to
reduce the size of SRv6 SID list in SRH
<xref target="I-D.cl-spring-generalized-srv6-for-cmpr"/>. A COC
(Continuation of Compression) flavor is defined to indicate the
continuation of SRv6 compressed SIDs in the SID list.</t>
          </section>
        </section>
        <section anchor="application-aware-ipv6-networking">
          <name>Application-aware IPv6 Networking</name>
          <t>Application-aware Networking (APN) is proposed by
<xref target="I-D.li-apn-framework"/>, where application characteristic
information such as application identification and its network
performance requirements is carried in the packet encapsulation in
order to facilitate service provisioning, perform application-level
traffic steering and network resource adjustment.</t>
          <t>Application-aware IPv6 Networking (APN6) framework makes use of
IPv6 encapsulation in order to convey the application-aware
information along with the data packet to the network so to
facilitate the service deployment and SLA
guarantee. <xref target="I-D.li-6man-app-aware-ipv6-network"/> defines the encodings
of the application characteristic information, for the APN6
framework, that can be exchanged between an application and the
network infrastructure through IPv6 extension headers.</t>
        </section>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rtgwg-net2cloud-problem-statement">
          <front>
            <title>Dynamic Networks to Hybrid Cloud DCs: Problem Statement and Mitigation Practices</title>
            <author fullname="Linda Dunbar" initials="L." surname="Dunbar">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Andrew G. Malis" initials="A. G." surname="Malis">
              <organization>Malis Consulting</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <author fullname="Mehmet Toy" initials="M." surname="Toy">
              <organization>Verizon</organization>
            </author>
            <author fullname="Kausik Majumdar" initials="K." surname="Majumdar">
              <organization>Microsoft</organization>
            </author>
            <date day="24" month="August" year="2023"/>
            <abstract>
              <t>   This document describes the network-related problems enterprises
   face at the moment of writing this specification when
   interconnecting their branch offices with dynamic workloads in
   third-party data centers (DC) (a.k.a. Cloud DCs). The Net2Cloud
   problem statements are mainly for enterprises with traditional VPN
   services who want to leverage those networks (instead of altogether
   abandoning them). Other problems are out of the scope of this
   document.
   This document also describes the mitigation practices for getting
   around the identified problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-net2cloud-problem-statement-29"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9252">
          <front>
            <title>BGP Overlay Services Based on Segment Routing over IPv6 (SRv6)</title>
            <author fullname="G. Dawra" initials="G." role="editor" surname="Dawra"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Zhuang" initials="S." surname="Zhuang"/>
            <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document defines procedures and messages for SRv6-based BGP services, including Layer 3 Virtual Private Network (L3VPN), Ethernet VPN (EVPN), and Internet services. It builds on "BGP/MPLS IP Virtual Private Networks (VPNs)" (RFC 4364) and "BGP MPLS-Based Ethernet VPN" (RFC 7432).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9252"/>
          <seriesInfo name="DOI" value="10.17487/RFC9252"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="I-D.dukes-spring-sr-for-sdwan">
          <front>
            <title>SR For SDWAN: VPN with Underlay SLA</title>
            <author fullname="Darren Dukes" initials="D." surname="Dukes">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Gaurav Dawra" initials="G." surname="Dawra">
              <organization>LinkedIn</organization>
            </author>
            <author fullname="Xiaohu Xu" initials="X." surname="Xu">
              <organization>Alibaba</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Pablo Camarillo" initials="P." surname="Camarillo">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Francois Clad" initials="F." surname="Clad">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefano Salsano" initials="S." surname="Salsano">
              <organization>Univ. of Rome Tor Vergata</organization>
            </author>
            <date day="22" month="February" year="2021"/>
            <abstract>
              <t>   This document describes how SR enables underlay Service Level
   Agreements (SLA) to a VPN with scale and security while ensuring
   service opacity.  This solution applies to Over-The-Top VPN (OTT VPN)
   and Software-Defined WAN (SDWAN).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dukes-spring-sr-for-sdwan-03"/>
        </reference>
        <reference anchor="I-D.dunbar-sr-sdwan-over-hybrid-networks">
          <front>
            <title>SRv6 across SDWAN paths</title>
            <author fullname="Linda Dunbar" initials="L." surname="Dunbar">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Mehmet Toy" initials="M." surname="Toy">
              <organization>Verizon</organization>
            </author>
            <date day="18" month="May" year="2021"/>
            <abstract>
              <t>   This document describes the mechanism of steering packets across
   SDWAN segments based on the metadata carried by the SRv6 packets.

   Some of the SDWAN segments are untrusted networks, and some are
   private networks. The goal is to achieve the optimal E2E quality.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dunbar-sr-sdwan-over-hybrid-networks-07"/>
        </reference>
        <reference anchor="I-D.ietf-idr-segment-routing-te-policy">
          <front>
            <title>Advertising Segment Routing Policies in BGP</title>
            <author fullname="Stefano Previdi" initials="S." surname="Previdi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Paul Mattes" initials="P." surname="Mattes">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dhanendra Jain" initials="D." surname="Jain">
              <organization>Google</organization>
            </author>
            <date day="25" month="July" year="2023"/>
            <abstract>
              <t>   This document introduces a BGP SAFI with two NLRIs to advertise a
   candidate path of a Segment Routing (SR) Policy.  An SR Policy is an
   ordered list of segments (i.e., instructions) that represent a
   source-routed policy.  An SR Policy consists of one or more candidate
   paths, each consisting of one or more segment lists.  A headend may
   be provisioned with candidate paths for an SR Policy via several
   different mechanisms, e.g., CLI, NETCONF, PCEP, or BGP.  This
   document specifies how BGP may be used to distribute SR Policy
   candidate paths.  It defines sub-TLVs for the Tunnel Encapsulation
   Attribute for signaling information about these candidate paths.

   This documents updates RFC9012 with extensions to the Color Extended
   Community to support additional steering modes over SR Policy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-segment-routing-te-policy-23"/>
        </reference>
        <reference anchor="I-D.ietf-pce-segment-routing-policy-cp">
          <front>
            <title>PCEP extension to support Segment Routing Policy Candidate Paths</title>
            <author fullname="Mike Koldychev" initials="M." surname="Koldychev">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan">
              <organization>Ciena Corporation</organization>
            </author>
            <author fullname="Colby Barth" initials="C." surname="Barth">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Shuping Peng" initials="S." surname="Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Hooman Bidgoli" initials="H." surname="Bidgoli">
              <organization>Nokia</organization>
            </author>
            <date day="24" month="July" year="2023"/>
            <abstract>
              <t>   A Segment Routing (SR) Policy [RFC9256] is a non-empty set of SR
   Candidate Paths, that share the same &lt;headend, color, endpoint&gt;
   tuple.  This document extends [RFC8664] to fully support the SR
   Policy construct.  SR Policy is modeled in PCEP as an Association of
   one or more SR Candidate Paths.  PCEP extensions are defined to
   signal additional attributes of an SR Policy, which are not covered
   by [RFC8664].  The mechanism is applicable to all data planes of SR
   (MPLS, SRv6, etc.).


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pce-segment-routing-policy-cp-12"/>
        </reference>
        <reference anchor="I-D.ietf-spring-sr-service-programming">
          <front>
            <title>Service Programming with Segment Routing</title>
            <author fullname="Francois Clad" initials="F." surname="Clad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Xiaohu Xu" initials="X." surname="Xu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Daniel Bernier" initials="D." surname="Bernier">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Shaowen Ma" initials="S." surname="Ma">
              <organization>Mellanox</organization>
            </author>
            <author fullname="Chaitanya Yadlapalli" initials="C." surname="Yadlapalli">
              <organization>AT&amp;T</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <author fullname="Stefano Salsano" initials="S." surname="Salsano">
              <organization>Universita di Roma "Tor Vergata"</organization>
            </author>
            <date day="21" month="August" year="2023"/>
            <abstract>
              <t>   This document defines data plane functionality required to implement
   service segments and achieve service programming in SR-enabled MPLS
   and IPv6 networks, as described in the Segment Routing architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-service-programming-08"/>
        </reference>
        <reference anchor="I-D.ietf-spring-nsh-sr">
          <front>
            <title>Integration of Network Service Header (NSH) and Segment Routing for Service Function Chaining (SFC)</title>
            <author fullname="Jim Guichard" initials="J." surname="Guichard">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="6" month="June" year="2023"/>
            <abstract>
              <t>   This document describes the integration of the Network Service Header
   (NSH) and Segment Routing (SR), as well as encapsulation details, to
   efficiently support Service Function Chaining (SFC) while maintaining
   separation of the service and transport planes as originally intended
   by the SFC architecture.

   Combining these technologies allows SR to be used for steering
   packets between Service Function Forwarders (SFF) along a given
   Service Function Path (SFP) while NSH has the responsibility for
   maintaining the integrity of the service plane, the SFC instance
   context, and any associated metadata.

   This integration demonstrates that NSH and SR can work cooperatively
   and provide a network operator with the flexibility to use whichever
   transport technology makes sense in specific areas of their network
   infrastructure while still maintaining an end-to-end service plane
   using NSH.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-nsh-sr-15"/>
        </reference>
        <reference anchor="I-D.ietf-teas-enhanced-vpn">
          <front>
            <title>A Framework for Enhanced Virtual Private Network (VPN+)</title>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei</organization>
            </author>
            <author fullname="Stewart Bryant" initials="S." surname="Bryant">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Zhenqiang Li" initials="Z." surname="Li">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Takuya Miyasaka" initials="T." surname="Miyasaka">
              <organization>KDDI Corporation</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <date day="28" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the framework for Enhanced Virtual Private
   Network (VPN+) to support the needs of applications with specific
   traffic performance requirements (e.g., low latency, bounded jitter).
   VPN+ leverages the VPN and Traffic Engineering (TE) technologies and
   adds characteristics that specific services require beyond those
   provided by conventional VPNs.  Typically, VPN+ will be used to
   underpin network slicing, but could also be of use in its own right
   providing enhanced connectivity services between customer sites.
   This document also provides an overview of relevant technologies in
   different network layers, and identifies some areas for potential new
   work.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-enhanced-vpn-14"/>
        </reference>
        <reference anchor="I-D.dong-6man-enhanced-vpn-vtn-id">
          <front>
            <title>Carrying Virtual Transport Network (VTN) Identifier in IPv6 Extension Header</title>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Chenhao Ma" initials="C." surname="Ma">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="24" month="October" year="2021"/>
            <abstract>
              <t>   Virtual Private Networks (VPNs) provide different customers with
   logically separated connectivity over a common network
   infrastructure.  With the introduction and evolvement of 5G and other
   network scenarios, some existing or new customers may require
   connectivity services with advanced characteristics comparing to
   traditional VPNs.  Such kind of network service is called enhanced
   VPNs (VPN+).

   A Virtual Transport Network (VTN) is a virtual underlay network which
   consists of a set of dedicated or shared network resources allocated
   from the physical underlay network, and is associated with a
   customized logical network topology.  VPN+ services can be delivered
   by mapping one or a group of overlay VPNs to the appropriate VTNs as
   the virtual underlay.  In packet forwarding, some fields in the data
   packet needs to be used to identify the VTN the packet belongs to, so
   that the VTN-specific processing can be performed on each node the
   packet traverses.

   This document proposes a new Hop-by-Hop option of IPv6 extension
   header to carry the VTN Resource ID, which is used to identify the
   set of network resources allocated to a VTN for packet processing.
   The procedure for processing the VTN option is also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dong-6man-enhanced-vpn-vtn-id-06"/>
        </reference>
        <reference anchor="RFC9341">
          <front>
            <title>Alternate-Marking Method</title>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="M. Cociglio" initials="M." surname="Cociglio"/>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="T. Zhou" initials="T." surname="Zhou"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>This document describes the Alternate-Marking technique to perform packet loss, delay, and jitter measurements on live traffic. This technology can be applied in various situations and for different protocols. According to the classification defined in RFC 7799, it could be considered Passive or Hybrid depending on the application. This document obsoletes RFC 8321.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9341"/>
          <seriesInfo name="DOI" value="10.17487/RFC9341"/>
        </reference>
        <reference anchor="RFC9343">
          <front>
            <title>IPv6 Application of the Alternate-Marking Method</title>
            <author fullname="G. Fioccola" initials="G." surname="Fioccola"/>
            <author fullname="T. Zhou" initials="T." surname="Zhou"/>
            <author fullname="M. Cociglio" initials="M." surname="Cociglio"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="R. Pang" initials="R." surname="Pang"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>This document describes how the Alternate-Marking Method can be used as a passive performance measurement tool in an IPv6 domain. It defines an Extension Header Option to encode Alternate-Marking information in both the Hop-by-Hop Options Header and Destination Options Header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9343"/>
          <seriesInfo name="DOI" value="10.17487/RFC9343"/>
        </reference>
        <reference anchor="I-D.ietf-ippm-ioam-ipv6-options">
          <front>
            <title>In-situ OAM IPv6 Options</title>
            <author fullname="Shwetha Bhandari" initials="S." surname="Bhandari">
              <organization>Thoughtspot</organization>
            </author>
            <author fullname="Frank Brockners" initials="F." surname="Brockners">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="7" month="May" year="2023"/>
            <abstract>
              <t>   In-situ Operations, Administration, and Maintenance (IOAM) records
   operational and telemetry information in the packet while the packet
   traverses a path between two points in the network.  This document
   outlines how IOAM data fields are encapsulated in IPv6.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ippm-ioam-ipv6-options-12"/>
        </reference>
        <reference anchor="RFC9326">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Direct Exporting</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="B. Gafni" initials="B." surname="Gafni"/>
            <author fullname="F. Brockners" initials="F." surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) is used for recording and collecting operational and telemetry information. Specifically, IOAM allows telemetry data to be pushed into data packets while they traverse the network. This document introduces a new IOAM option type (denoted IOAM-Option-Type) called the "IOAM Direct Export (DEX) Option-Type". This Option-Type is used as a trigger for IOAM data to be directly exported or locally aggregated without being pushed into in-flight data packets. The exporting method and format are outside the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9326"/>
          <seriesInfo name="DOI" value="10.17487/RFC9326"/>
        </reference>
        <reference anchor="I-D.song-opsawg-ifit-framework">
          <front>
            <title>Framework for In-situ Flow Information Telemetry</title>
            <author fullname="Haoyu Song" initials="H." surname="Song">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Fengwei Qin" initials="F." surname="Qin">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Huanan Chen" initials="H." surname="Chen">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Jaewhan Jin" initials="J." surname="Jin">
              <organization>LG U+</organization>
            </author>
            <author fullname="Jongyoon Shin" initials="J." surname="Shin">
              <organization>SK Telecom</organization>
            </author>
            <date day="24" month="April" year="2023"/>
            <abstract>
              <t>   As network scale increases and network operation becomes more
   sophisticated, existing Operation, Administration, and Maintenance
   (OAM) methods are no longer sufficient to meet the monitoring and
   measurement requirements.  Emerging data-plane on-path telemetry
   techniques, such as IOAM and AltMrk, which provide high-precision
   flow insight and issue notifications in real time can supplement
   existing proactive and reactive methods that run in active and
   passive modes.  They enable quality of experience for users and
   applications, and identification of network faults and deficiencies.
   This document describes a reference framework, named as In-situ Flow
   Information Telemetry, for the on-path telemetry techniques.

   The high-level framework outlines the system architecture for
   applying the on-path telemetry techniques to collect and correlate
   performance measurement information from the network.  It identifies
   the components that coordinate existing protocol tools and telemetry
   mechanisms, and addresses deployment challenges for flow-oriented on-
   path telemetry techniques, especially in carrier networks.

   The document is a guide for system designers applying the referenced
   techniques.  It is also intended to motivate further work to enhance
   the OAM ecosystem.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-song-opsawg-ifit-framework-20"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="30" month="June" year="2023"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Re-route (TI-LFA), aimed at providing protection of node and
   adjacency segments within the Segment Routing (SR) framework.  This
   Fast Re-route (FRR) behavior builds on proven IP-FRR concepts being
   LFAs, remote LFAs (RLFA), and remote LFAs with directed forwarding
   (DLFA).  It extends these concepts to provide guaranteed coverage in
   any two connected networks using a link-state IGP.  A key aspect of
   TI-LFA is the FRR path selection approach establishing protection
   over the expected post-convergence paths from the point of local
   repair, reducing the operational need to control the tie-breaks among
   various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-11"/>
        </reference>
        <reference anchor="I-D.hu-spring-segment-routing-proxy-forwarding">
          <front>
            <title>SR-TE Path Midpoint Restoration</title>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Huaimo Chen" initials="H." surname="Chen">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Junda Yao" initials="J." surname="Yao">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Chris Bowers" initials="C." surname="Bowers">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <date day="21" month="August" year="2023"/>
            <abstract>
              <t>   Segment Routing Traffic Engineering (SR-TE) supports explicit paths
   using segment lists containing adjacency-SIDs, node-SIDs and binding-
   SIDs.  The current SR FRR such as TI-LFA provides fast re-route
   protection for the failure of a node along a SR-TE path by the direct
   neighbor or say point of local repair (PLR) to the failure.  However,
   once the IGP converges, the SR FRR is no longer sufficient to forward
   traffic of the path around the failure, since the non-neighbors of
   the failure will no longer have a route to the failed node.  This
   document describes a mechanism for the restoration of the routes to
   the failure of a SR-MPLS TE path after the IGP converges.  It
   provides the restoration of the routes to an adjacency segment, a
   node segment and a binding segment of the path.  With the restoration
   of the routes to the failure, the traffic is continuously sent to the
   neighbor of the failure after the IGP converges.  The neighbor as a
   PLR fast re-routes the traffic around the failure.



              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hu-spring-segment-routing-proxy-forwarding-24"/>
        </reference>
        <reference anchor="I-D.chen-rtgwg-srv6-midpoint-protection">
          <front>
            <title>SRv6 Midpoint Protection</title>
            <author fullname="Huanan Chen" initials="H." surname="Chen">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Huaimo Chen" initials="H." surname="Chen">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="12" month="August" year="2023"/>
            <abstract>
              <t>   The current local repair mechanism, e.g., TI-LFA, allows local repair
   actions on the direct neighbors of the failed node or link to
   temporarily route traffic to the destination.  This mechanism does
   not work properly for SRv6 TE path after the failure happens in the
   destination point and IGP converges on the failure.  This document
   defines midpoint protection for SRv6 TE path, which enables other
   nodes on the network to perform endpoint behaviors for the faulty
   node, update the IPv6 destination address to the next endpoint after
   the faulty node, and choose the next hop based on the new destination
   address.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-rtgwg-srv6-midpoint-protection-12"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-srv6-egress-protection">
          <front>
            <title>SRv6 Path Egress Protection</title>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Huaimo Chen" initials="H." surname="Chen">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Mehmet Toy" initials="M." surname="Toy">
              <organization>Verizon</organization>
            </author>
            <author fullname="Chang Cao" initials="C." surname="Cao">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Tao He" initials="T." surname="He">
              <organization>China Unicom</organization>
            </author>
            <date day="29" month="August" year="2023"/>
            <abstract>
              <t>   TI-LFA specifies fast protections for transit nodes and links of an
   SR path.  However, it does not present any fast protections for the
   egress node of the SR path.  This document describes protocol
   extensions for fast protecting the egress node and link of a Segment
   Routing for IPv6 (SRv6) path.



              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-srv6-egress-protection-14"/>
        </reference>
        <reference anchor="I-D.geng-spring-sr-redundancy-protection">
          <front>
            <title>SRv6 for Redundancy Protection</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mach Chen" initials="M." surname="Chen">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Fan Yang" initials="F." surname="Yang">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Pablo Camarillo" initials="P." surname="Camarillo">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="2" month="August" year="2021"/>
            <abstract>
              <t>   Redundancy Protection is a generalized protection mechanism to
   achieve the high reliability of service transmission in Segment
   Routing network.  The mechanism inherits the "Live-Live" methodology,
   targeting to enhance the functionalities of Segment Routing over
   IPv6.  Inspired by DetNet Packet Replication and Packet Elimination
   functions, two new Segments are introduced to provide replication and
   elimination functions on specific network nodes by leveraging SRv6
   Segment programming capabilities.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-spring-sr-redundancy-protection-05"/>
        </reference>
        <reference anchor="I-D.li-spring-srv6-security-consideration">
          <front>
            <title>Security Considerations for SRv6 Networks</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Hui Tian" initials="H." surname="Tian">
              <organization>CAICT</organization>
            </author>
            <author fullname="tongtian124" initials="" surname="tongtian124">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jianwei Mao" initials="J." surname="Mao">
              <organization>Huawei</organization>
            </author>
            <date day="23" month="July" year="2023"/>
            <abstract>
              <t>   SRv6 inherits potential security vulnerabilities from source routing
   in general, and also from IPv6.  This document describes various
   threats and security concerns related to SRv6 networks and existing
   approaches to solve these threats.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-spring-srv6-security-consideration-11"/>
        </reference>
        <reference anchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="I-D.ietf-idr-bgp-ls-link-mtu">
          <front>
            <title>Signaling Maximum Transmission Unit (MTU) using BGP-LS</title>
            <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Shuping Peng" initials="S." surname="Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Robbins Mwehair" initials="R." surname="Mwehair">
              <organization>MTN Uganda Ltd.</organization>
            </author>
            <date day="26" month="July" year="2023"/>
            <abstract>
              <t>   BGP Link State (BGP-LS) describes a mechanism by which link-state and
   TE information can be collected from networks and shared with
   external components using the BGP routing protocol.  The centralized
   controller (PCE/SDN) completes the service path calculation based on
   the information transmitted by the BGP-LS and delivers the result to
   the Path Computation Client (PCC) through the PCEP or BGP protocol.

   Segment Routing (SR) leverages the source routing paradigm, which can
   be directly applied to the MPLS architecture with no change on the
   forwarding plane and applied to the IPv6 architecture, with a new
   type of routing header, called SRH.  The SR uses the IGP protocol as
   the control protocol.  Compared to the MPLS tunneling technology, the
   SR does not require additional signaling.  Therefore, the SR does not
   support the negotiation of the Path MTU.  Since multiple labels or
   SRv6 SIDs are pushed in the packets, it is more likely that the
   packet size exceeds the path mtu of SR tunnel.

   This document specifies the extensions to BGP Link State (BGP-LS) to
   carry maximum transmission unit (MTU) messages of link.  The PCE/SDN
   calculates the Path MTU while completing the service path calculation
   based on the information transmitted by the BGP-LS.



              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-ls-link-mtu-05"/>
        </reference>
        <reference anchor="I-D.ietf-idr-sr-policy-path-mtu">
          <front>
            <title>Segment Routing Path MTU in BGP</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Ahmed El Sawaf" initials="A." surname="El Sawaf">
              <organization>Saudi Telecom Company</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   Segment Routing is a source routing paradigm that explicitly
   indicates the forwarding path for packets at the ingress node.  An SR
   policy is a set of candidate SR paths consisting of one or more
   segment lists with necessary path attributes.  However, the path
   maximum transmission unit (MTU) information for SR path is not
   available in the SR policy since the SR does not require signaling.
   This document defines extensions to BGP to distribute path MTU
   information within SR policies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-sr-policy-path-mtu-07"/>
        </reference>
        <reference anchor="I-D.li-pce-pcep-pmtu">
          <front>
            <title>Support for Path MTU (PMTU) in the Path Computation Element (PCE) communication Protocol (PCEP).</title>
            <author fullname="Shuping Peng" initials="S." surname="Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Liuyan Han" initials="L." surname="Han">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Luc-Fabrice Ndifor" initials="L." surname="Ndifor">
              <organization>MTN Cameroon</organization>
            </author>
            <date day="21" month="October" year="2021"/>
            <abstract>
              <t>   The Path Computation Element (PCE) provides path computation
   functions in support of traffic engineering in Multiprotocol Label
   Switching (MPLS) and Generalized MPLS (GMPLS) networks.

   The Source Packet Routing in Networking (SPRING) architecture
   describes how Segment Routing (SR) can be used to steer packets
   through an IPv6 or MPLS network using the source routing paradigm.  A
   Segment Routed Path can be derived from a variety of mechanisms,
   including an IGP Shortest Path Tree (SPT), explicit configuration, or
   a Path Computation Element (PCE).

   Since the SR does not require signaling, the path maximum
   transmission unit (MTU) information for SR path is not available.
   This document specify the extension to PCE communication protocol
   (PCEP) to carry path (MTU) in the PCEP messages.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-pce-pcep-pmtu-05"/>
        </reference>
        <reference anchor="I-D.srcompdt-spring-compression-requirement">
          <front>
            <title>Compressed SRv6 SID List Requirements</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Ron Bonica" initials="R." surname="Bonica">
              <organization>Juniper</organization>
            </author>
            <author fullname="Darren Dukes" initials="D." surname="Dukes">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <date day="11" month="July" year="2021"/>
            <abstract>
              <t>   This document specifies requirements for solutions to compress SRv6
   SID lists.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-srcompdt-spring-compression-requirement-07"/>
        </reference>
        <reference anchor="I-D.cl-spring-generalized-srv6-np">
          <front>
            <title>Generalized SRv6 Network Programming</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Cong Li" initials="C." surname="Li">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Hui Tian" initials="H." surname="Tian">
              <organization>CAICT</organization>
            </author>
            <author fullname="Feng Zhao" initials="F." surname="Zhao">
              <organization>CAICT</organization>
            </author>
            <date day="14" month="March" year="2021"/>
            <abstract>
              <t>   As the deployment of SRv6, some new requirements are proposed, such
   as SRv6 compression, transporting over SR-MPLS/MPLS and IPv4 domains.
   Therefore, it is necessary to consider other types of segments or
   sub-paths in the end-to-end SRv6 network programming.

   This document proposes Generalized Segment Routing over IPv6 (G-SRv6)
   Networking Programming, which supports to encode multiple types of
   Segments in a SRH, called Generalized SRH (G-SRH).  These Segments
   can be called Generalized Segment, and the ID can be Generalized
   Segment Identifier (G-SID), which may include an SRv6 SID(128 bits),
   C-SIDs, MPLS labels, or IPv4 tunnel information.

   This document also defines the mechanisms of Generalized SRv6
   Networking Programming and the requirements of related protocol
   extensions of control plane and data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cl-spring-generalized-srv6-np-03"/>
        </reference>
        <reference anchor="I-D.lc-6man-generalized-srh">
          <front>
            <title>Generalized Segment Routing Header</title>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Cong Li" initials="C." surname="Li">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Hui Tian" initials="H." surname="Tian">
              <organization>CAICT</organization>
            </author>
            <author fullname="Feng Zhao" initials="F." surname="Zhao">
              <organization>CAICT</organization>
            </author>
            <date day="9" month="February" year="2021"/>
            <abstract>
              <t>   Generalized SRv6 network programming defines the enhanced mechanisms
   of SRv6 to encode SRv6 SIDs, Compressed SIDs and even the MPLS labels
   or IPv4 tunnel information in a single SRH.  This type of SRH is
   called Generalized SRH (G-SRH), which can reduce the overhead of SRv6
   and also provide more flexibility for network programming.  This
   document defines the encapsulation and packet processing of G-SRH.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lc-6man-generalized-srh-03"/>
        </reference>
        <reference anchor="I-D.cl-spring-generalized-srv6-for-cmpr">
          <front>
            <title>Generalized SRv6 Network Programming for SRv6 Compression</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Francois Clad" initials="F." surname="Clad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Aihua Liu" initials="A." surname="Liu">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Shay Zadok" initials="S." surname="Zadok">
              <organization>Broadcom</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   This document proposes Generalized Segment Routing over IPv6 (G-SRv6)
   Networking Programming for SRv6 compression.

   G-SRv6 can reduce the overhead of SRv6 by encoding the Generalized
   SIDs(G-SID) in SID list, and it also supports to program SRv6 SIDs
   and G-SIDs in a single SRH to support incremental deployment and
   smooth upgrade.

   G-SRv6 is fully compatible with SRv6 with no modification of SRH, no
   new address consumption, no new route creation, and even no
   modification of control plane.

   G-SRv6 for Compression is designed based on the Compressed SRv6
   Segment List Encoding in SRH [I-D.ietf-spring-srv6-srh-compression]
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cl-spring-generalized-srv6-for-cmpr-07"/>
        </reference>
        <reference anchor="I-D.li-apn-framework">
          <front>
            <title>Application-aware Networking (APN) Framework</title>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Shuping Peng" initials="S." surname="Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Cong Li" initials="C." surname="Li">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chang Cao" initials="C." surname="Cao">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="3" month="April" year="2023"/>
            <abstract>
              <t>   A multitude of applications are carried over the network, which have
   varying needs for network bandwidth, latency, jitter, and packet
   loss, etc.  Some new emerging applications have very demanding
   performance requirements.  However, in current networks, the network
   and applications are decoupled, that is, the network is not aware of
   the applications' requirements in a fine granularity.  Therefore, it
   is difficult to provide truly fine-granularity traffic operations for
   the applications and guarantee their SLA requirements.

   This document proposes a new framework, named Application-aware
   Networking (APN), where application-aware information (i.e.  APN
   attribute) including APN identification (ID) and/or APN parameters
   (e.g.  network performance requirements) is encapsulated at network
   edge devices and carried in packets traversing an APN domain in order
   to facilitate service provisioning, perform fine-granularity traffic
   steering and network resource adjustment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-apn-framework-07"/>
        </reference>
        <reference anchor="I-D.li-6man-app-aware-ipv6-network">
          <front>
            <title>Application-aware IPv6 Networking (APN6) Encapsulation</title>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Shuping Peng" initials="S." surname="Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cong Li" initials="C." surname="Li">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chang Liu" initials="C." surname="Liu">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Kentaro Ebisawa" initials="K." surname="Ebisawa">
              <organization>Toyota Motor Corporation</organization>
            </author>
            <date day="22" month="February" year="2021"/>
            <abstract>
              <t>   Application-aware IPv6 Networking (APN6) framework makes use of IPv6
   encapsulation in order to convey the application-aware information
   along with the data packet to the network so to facilitate the
   service deployment and SLA guarantee.

   This document defines the encodings of the application characteristic
   information, for the APN6 framework, that can be exchanged between an
   application or a network edge device such as CPE (Customer-Premises
   Equipment) and the network infrastructure through the use of IPv6
   extension headers.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-6man-app-aware-ipv6-network-03"/>
        </reference>
      </references>
    </references>
    <?line 733?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <artwork><![CDATA[
TBD


]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
