<?xml version="1.0" encoding="US-ASCII"?>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">

<rfc category="info" docName="draft-trossen-rtgwg-routing-beyond-reachability-01"
     ipr="trust200902">
  <front>
    <title abbrev="Multi-Purpose Routing System">Continuing to Evolve Internet Routing Beyond 'Mere' Reachability</title>

    <author fullname="Dirk Trossen" initials="D." surname="Trossen">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </author>

    <author fullname="David Lou" initials="D." surname="Lou">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>zhe.lou@huawei.com</email>
      </address>
    </author>

    <author fullname="Sheng Jiang" initials="S." surname="Jiang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city></city>
          <country>China</country>
        </postal>
        <email>jiangsheng@huawei.com</email>
      </address>
    </author>

    <date month="" year="2022"/>

    <area>Routing</area>

    <keyword></keyword>

    <abstract>

      <t>This document discusses the evolution of the Internet routing system
      beyond mere reachability.  We observe, through examples of past development,
      that such evolution has been taking place to improve on capabilities of the
      Internet, deal with more complicated network deployments and cater to changing
      requirements by end users as well as novel and emerging applications.</t>

      <t>For achieving a routing system that serves more than a singular
      reachability purpose, more information is taken into
      account when performing the purpose-specific functions. Such extra
      information can be obtained by extending current routing protocols
      to exchange more information or by carrying that information within
      packets.</t>

      <t>This document is intended to seed discussions of how the observed evolution
      of the Internet's routing system can continue, what issues may occur when simply
      continuing the current approach for achieving routing beyond 'mere' reachability and what may be
      needed to address those issues. Ultimately, however, this document recognizes the
      positive impact that moving beyond reachability has brought to the Internet and
      will continue to do so.</t>

    </abstract>

  </front>

  <middle>

    <section anchor="intro" title="Introduction">

      <t>The current routing system was initially designed for a single purpose -
      reachability. That is, it was built to find paths through the network
      so as to forward packets to their destinations. The routing system has
      successfully supported the Internet as it grew from a very small scale
      network to a giant system that covers the whole world with billions
      attached devices and users. This routing system has done a good job for
      global reachability, however, through the years, many other needs or
      purposes have arisen in the Internet, such as hostname/address mapping,
      destination selection, security, privacy, group isolation, various QoS requirements etc.
      Many of these additional needs or purposes have resulted in the development
      of extended and distinct systems, such as DNS, patched firewall, DPI, and CDN, etc.
      These systems have worked well but with costs in terms of quality of experience for the
      user, particularly with respect to time delay, but also with respect to costs of
      development, deployment and management throughout (parts of) the Internet.</t>

      <t>An alternative approach is the integration of extra capabilities and purposes into the routing
      system directly. By exchanging necessary additional information or including
      such information in the packet header, purposes beyond
      just reachability have found entry into the routing system over the many years of the
      Internet's development.</t>

      <t>This document presents a brief survey of solutions that, when combined,
      represent a routing system beyond reachability that effectively forms today's
      Internet. While this survey somewhat relates to that presented in <xref target="I-D.king-irtf-semantic-routing-survey"/>,
      our focus here is on the identification of the underlying purpose for developing extensions,
      not on the body of work that represents an approach for doing so (named 'semantic routing' in
      the above draft). However, <xref target="I-D.king-irtf-semantic-routing-survey"/> may be useful
      for more information on the specific extensions.</t>

      <t>Some of these extensions are intended to be deployed in limited domains <xref target="RFC8799"/>,
      while others are intended for use across the Internet. The boundary of limited domains may
      also be the boundary of purposes and semantics of information defining those purposes. This survey
      is used to demonstrate the recognized need by those having developed existing solutions
      for the Internet's routing system to have multiple purposes beyond mere reachability.</t>

      <t>Building on the survey and our summary, we recognize that, in many parts, the Internet has
      already evolved into a 'multi-purpose routing' system. However, we identify issues with the
      approach that has been taken so far, namely that of purpose-specific extensions.
      We assert that these issues will increasingly impede the Internet's ability to
      accommodate future purposes (represented in the form of new use cases), if we simply
      continue with a 'business as usual' attitude towards developing purpose-specific solutions for them.</t>

      <t> Instead, we position this document as the starting point for a discussion on how
      to evolve the Internet routing system in a coherent manner that will help us avoid the identified issues
      outlined in <xref target="Issues"/>, while still allowing for integrating evolving the semantics of communication
      along the lines outlined in <xref target="semantics"/> towards new purposes for Internet routing as
      they will emerge in the future.</t>

      <t>Note: This document does not discuss how routers may use policies, that are coded in, configured at,
      or signaled to it, to make routing decisions. It does neither pass comment on the advisability or
      practicality of any of the proposals nor does it define any technical solutions.</t>
    </section>

    <section title="Reachability - Original Purpose of the Routing System">

      <t>Network routing protocols were initially designed to enable forwarding
      of IP packets through the network toward destination addresses.
      Fundamental to this is the locator semantic of IP addresses, which has
      been assigned in the context of network topologies. The original routing
      system was designed on a distributed basis. Each router makes its own
      decision about the interface/link onto which it forwards a packet. Each
      decision takes the packet one hop closer to the destination. However,
      the choices made by distributed devices may not always work well if they
      are poorly coordinated between the routers, resulting in issues, such as
      forwarding loops, which may be transitory or permanent. So it is normal
      to require the use of the same algorithm to decide the forwarding actions
      at each hop.</t>

      <t>A way to avoid routing issues is to select an end-to-end path a priori
      and consistently execute forwarding on the intermediate routers accordingly.
      This element of traffic engineering is known as "path steering"
      <xref target="I-D.ietf-teas-rfc3272bis"/> and relies on the routing
      to protocols collect and exchange the reachability within a domain, so that
      any routers can select an end-to-end path <!--selection-->. However, the amount of
      information needed to support these decisions can become very large (e.g., in
      large networks, with many possible paths and route metrics), which might
      impede the scalability both in terms of the storage and the distribution
      of the information. Although network topology filters are often applied to reduce
      the storage of the network data and the complexity of the computation algorithm,
      the path computation accuracy and optimality may be negatively
      impacted.</t>

      <t>The Internet is a very complicated system that is made up of many
      independently built networks with two types of routing protocols: an interior gateway protocol (IGP) that routes inside
      a network and an exterior gateway protocol (such as BGP) that routes
      between networks. For a communication that crosses more than one domain,
      there could be many possible paths for the given destination. In principle,
      the more information that decision-making devices have, the better choices
      they can make. However, it is often infeasible to have all information of
      all potential end-to-end paths, particularly for communications through
      several networks with different ownership. Consequently, the best choices
      made within each domain may not reach the best overall result. A key challenge
    here is the tussle between abstraction, needed for scalability, and optimality,
    which abstraction may impede.</t>

      <t>When choosing the best paths or topology structures, the following
      may need to be considered:</t>

      <t><list style="symbols">
          <t>The method by which a path, or set of paths, is to be calculated.
          For example, a path may be selected automatically by the routing
          protocol or may be imposed (perhaps for traffic engineering reasons) by
          a central controller or management entity.</t>

          <t>The criteria used for selecting the best path. For example,
          classic route preference, or administrative policies such as
          economic costs, resilience, security, and (if requested) applying
          geopolitical considerations.</t>
        </list></t>

    </section>

    <section anchor="going_beyond" title="Extension of the Routing System Beyond 'Mere' Reachability">

     <t>In the following, we provide a brief overview of routing extensions with purposes beyond 'mere' reachability.
     We align our overview with many of the solutions described in <xref target="I-D.king-irtf-semantic-routing-survey"/> and
     refer to this draft for more detail, in addition to the example references themselves.</t>

     <t>The following <xref target="table_summary_extensions"/> focusses on three key aspects when considering routing extensions
     for our discussion in this draft:</t>

     <t><list style="symbols">
       <t>Purpose: What is the intended purpose of the proposed extension? This aspect may lead to a taxonomy for looking at the capabilities
       of a multi-purpose routing system.</t>
       <t>Approach: What is the underlying technical approach to achieve the intended purpose? This aspect may lead to a taxonomy of approaches
       for achieving desired routing purposes.</t>
       <t>Examples: What are known examples that have employed the given approach to achieve the given routing purpose? This aspect provides
       a possibly growing catalogue of explicit examples to study in more detail.</t>
     </list></t>

     <texttable anchor="table_summary_extensions" title="Summary of Routing Extensions">
      <ttcol align='center'>Purpose</ttcol>
      <ttcol align='center'>Approach</ttcol>
      <ttcol align='center'>Examples</ttcol>
      <c>Path Selection for Traffic Engineering</c>
      <c>Preferential Routing</c>
      <c>IS-IS Extensions <xref target="RFC5305"/></c>
      <c></c>
      <c>Policy-based Routing</c>
      <c>PBR models <xref target="RFC1104"/>
      Inter-domain policy routing <xref target="RFC1479"/></c>
      <c></c>
      <c>Flow Steering</c>
      <c>TBD</c>
      <c></c>
      <c>Path Computation</c>
      <c>PCE <xref target="RFC4655"/>
      PCEP <xref target="RFC5440"/>
      PCEP Extension <xref target="RFC8231"/></c>
      <c></c>
      <c>IRTF</c>
      <c>Path-aware Networking RG <xref target="PANRGref"/>
      Path properties <xref target="I-D.irtf-panrg-path-properties"/>
      Past efforts evaluation <xref target="I-D.irtf-panrg-what-not-to-do"/></c>

      <c>Path Selection for Multicast</c>
      <c>Multicast</c>
      <c>IP multicast <xref target="RFC1112"/>
      IPv6 addressing <xref target="RFC4291"/>
      MBone <xref target="MBONEref"/>
      MADCAP <xref target="RFC2730"/>
      MALLOC <xref target="RFC6308"/>
      MASC <xref target="RFC2909"/>
      MZAP <xref target="RFC2776"/>
      MSDP <xref target="RFC3618"/>
      SSM <xref target="RFC4607"/></c>
      <c></c>
      <c>Automatic Multicast Tunneling</c>
      <c>AMT <xref target="RFC7450"/></c>
      <c></c>
      <c>Path-based Forwarding</c>
      <c>BIER <xref target="RFC8279"/>
      BIER encapsulation <xref target="RFC8296"/>
      IP-over-ICN <xref target="I-D.trossen-icnrg-internet-icn-5glan"/></c>

      <c>Routing Architectures</c>
      <c>Future architectures</c>
      <c><xref target="RESEARCHFIAref"/>
      <xref target="ITUNET2030ref"/>
      <xref target="SCIONref"/>
      <xref target="RINAref"/></c>

      <c>Service Function Chaining</c>
      <c>L2/L3 Explicit Header Chaining</c>
      <c>SFC <xref target="RFC7665"/>
      NSH <xref target="RFC8300"/>
      MPLS encapsulation <xref target="RFC8596"/></c>
      <c></c>
      <c>Name-based Chaining</c>
      <c>Name-based SFF <xref target="RFC8677"/></c>
      <c></c>
      <c>Source Routing</c>
      <c>Segment Routing <xref target="RFC8402"/></c>

      <c>Application/service-aware Routing</c>
      <c>Application-server based</c>
      <c>Aalto <xref target="RFC7285"/>
         APN <xref target="I-D.li-apn-framework"/></c>
      <c></c>
      <c>L3 based</c>
      <c>Dyncast use cases <xref target="I-D.liu-dyncast-ps-usecases"/>
      Dyncast use architecture <xref target="I-D.li-dyncast-architecture"/></c>
      <c></c>
      <c>Network programming</c>
      <c>Segment routing <xref target="RFC8986"/></c>

      <c>Anycast Routing</c>
      <c>IP Anycast</c>
      <c>Architcture considerations<xref target="RFC7094"/>
         Operation of Anycast <xref target="RFC4786"/></c>
      <c></c>
      <c>Metric-based</c>
      <c>Dyncast use cases <xref target="I-D.liu-dyncast-ps-usecases"/>
      Dyncast architecture <xref target="I-D.li-dyncast-architecture"/>
      Load-balanced anycast <xref target="weightedRef"/></c>

      <c>Privacy-aware Routing</c>
      <c>Crypto routing</c>
      <c>CGA <xref target="RFC3972"/>
      CGA Extension Field <xref target="RFC4581"/></c>
      <c></c>
      <c>Obfuscation</c>
      <c>ILNP-based <xref target="ILNP_PRIVACY"/></c>

      <c>Security-enhanced Routing</c>
      <c>Routing Architecture</c>
      <c>SCION <xref target="SCIONref"/></c>

      <c>Identity Split Routing</c>
      <c>Identity/Locator Split</c>
      <c>LISP <xref target="RFC6830"/>&nbsp;
      LISPbis <xref target="I-D.ietf-lisp-rfc6830bis"/>
      LISPbis <xref target="I-D.ietf-lisp-rfc6833bis"/>
      HIP<xref target="RFC4423"/>
      ILNP <xref target="RFC6740"/></c>

      <c>Content Routing</c>
      <c>Routing over content names</c>
      <c>ICN <xref target="ICNref"/>
      NDN <xref target="NDNref"/>
      ICN deployment <xref target="RFC8763"/>
      HICN <xref target="HICNref"/></c>
      <c></c>
      <c>Routing via indirection points</c>
      <c>DNS
      DONA <xref target="DONAref"/></c>

      <c>Differentiated Routing</c>
      <c>QoS Differentiation</c>
      <c>DiffServ <xref target="RFC2474"/>
      IntServ <xref target="RFC2210"/></c>
      <c></c>
      <c>Path differentiation</c>
      <c>Segment Routing <xref target="RFC8402"/>
      SFC <xref target="RFC7665"/></c>

      <c>Extended Routing</c>
      <c>EH-based</c>
      <c>IPv6 EH <xref target="RFC8200"/></c>

     </texttable>

    </section>

    <section anchor="Issues" title="Issues with Current Approaches">

      <t>Developing routing purposes beyond the original 'mere' reachability does come with issues when considering their deployment and use in the Internet;
      we outline those issues in the following.</t>

      <t>We note that those issues are intrinsically linked to the ones stemming from the extension of addressing semantics that may
      be used to realize the various routing extensions, identified in <xref target="I-D.jia-intarea-internet-addressing-gap-analysis"/>.
      We therefore structure our presentation along the same lines.</t>

      <section anchor="Limiting_Routing" title="Limiting Routing Semantics">

        <t>Approaches that intend to change the purpose of communication, specifically within the evolution of communication semantics
          outlined in <xref target="semantics"/> through, e.g., by separating host from network node identification
        <xref target="RFC7401"/> or through identification of content directly <xref target="HICNref"/>, are limited by the reachability
        purpose of IPv6, as defined by its source and destination address.</t>

        <t>This leads to approaches such as <xref target="I-D.trossen-icnrg-internet-icn-5glan"/> to override addressing semantics, namely replacing
        the IPv6 source and destination addresses with path information instead, in order to achieve the desired purpose of its routing solution. This, in turn,
        requires to still carry address information as part of the payload in order to support clients unaware of the routing extension. Furthermore,
        such approach may lead to 'information leakage'<!-- of the changed address semantic --> outside the boundaries of the system in which its changed purpose is
        being realized. Introduction of dedicated gateways to 'translate' from one purpose (new routing) to another (IPv6 routing) is the consequence of this.</t>

        <t>But even such approach of 're-writing' packet information towards a new purpose limits the expressible (new) semantic information to the size of the original field,
        thereby limiting the support of content information in approaches such as <xref target="HICNref"/> or the size of supported networks in <xref target="I-D.trossen-icnrg-internet-icn-5glan"/>
        to the bit size afforded by IPv6 addresses.</t>
      </section>

      <section anchor="complexity" title="Complexity and Efficiency">

        <t>Introducing new routing purposes also bring additional complexity. This becomes an issue when new purposes are being introduced in particular
        parts of the overall Internet, such as the edge of the network, while relying on the existing reachability purpose of the Internet to interconnect
        those islands over the existing Internet.</t>

        <t>This additional complexity therefore often comes with a penalty in the form of efficiency and costs for realizing the novel routing purpose, which
        in turn may specifically pose an even bigger problem when the solution is introduced at the edge of the network, which is often constrained in resources
        and therefore costs that can be expensed.</t>

        <t>For instance, if the specific new purpose requires compression of packet fields, such as for header compression, additional processing as well as potentially
        required gateways that restore information towards the Internet may be prohibitive for introducing the desired new routing purpose in this part of the Internet.</t>

        <t>Conversely, performance requirements of core networks, in terms of packet processing speed, pose a problem when wanting to accommodate novel routing purposes.
        Here, not only the possibly additional processing but also the required changes of often HW-based platforms makes adoption of novel routing purposes prohibitive.</t>

        <section anchor="encapsulation" title="Repetitive encapsulation">

        <t>A routing solution targetting a different purposes often requires encapsulating the relevant information, thereby bloating
        packet sizes and lowering overall efficiency. This can be seen in routing solutions such as <xref target="I-D.trossen-icnrg-internet-icn-5glan"/>
        (introducing an alternative forwarding solution), <xref target="I-D.ietf-lisp-mn"/> (handling mobility in LISP), <xref target="RFC8926"/> and
        <xref target="RFC7348"/> (DC networking), <xref target="RFC8986"/>  (traffic engineering) as well as <xref target="TOR"/> (routing privacy), all of which
        introduce multiple encapsulations that in turn reduce the forwarding effiency.</t>

        <t>The introduction of dedicated points of encapsulation also introduce complexity and costs at the points of the network where they are required, which may
        often be at the network edge, while also establishing failure points and therefore increasing the overall fragility of the system; a point we discuss in more
        detail in <xref target="fragility"/>. </t>

        </section>

        <section anchor="path_stretch" title="Introducing Path Stretch">
          <t>Path stretch is an issue when moving from direct reachability purposes to additional ones, such as dealing with mobility of endpoints, as done in
          MobileIP <xref target="RFC6275"/>. In this case, following the typical triangular route affects transmission effiency as well as overall latency of the
          communication, instead of communicating directly towards the (new) network location.</t>

          <t>Additionally, the realization of novel purposes, such as privacy-compliant routing in systems like TOR <xref target="TOR"/>, often introduce
          path stretch due to the additional relays being introduced for fulfilling the intended purpose, here the obfuscation of traffic for privacy reasons.</t>

        </section>

        <section anchor="traffic_engineering" title="Complicating Traffic Engineering">

          <t>As outlined in <xref target="going_beyond"/>, many solutions to extend the original reachability purpose of Internet routing aim to introduce or
          improve on traffic engineering capabilities, e.g., by enabling decisions based on QoS metrics, mobility, chaining and others aspects.</t>

          <t>However, realizing each novel purpose as a separate solution in itself likely hampers the goal for which they are developed, namely to improve
          on traffic engineering, whenever individual solutions are being used in combination. This 'feature interaction' aspect may even prevent combined uses,
          while at a minimum requiring an understanding if combined uses are possible in the first place or instead incompatible with each other. This is not just
          an issue that routing purposes may be incompatible at a functional level, e.g., through conflicting policies, but may also utilize conflicting realizations
          for their purposes.</t>
        </section>

      </section>

      <section anchor="security_issue" title="Security">
        <t>Security issues, outside the security considerations of the specific design, often arise from the integration of the specific solution into the existing
        routing system. For instance, HIP <xref target="RFC7401"/> limits its host identity to 128bit in an effort to be backward compatible, but possibly resulting
        in weak cryptographical strength. A similar issue can be observed in CGA <xref target="RFC3972"/>, where only 59bits of the 128bit limit may be used for what
        could be packet signatures not sufficiently robust enough against attacks.</t>

        <t>Attempts to introduce privacy purposes into the routing system, e.g., by utilizing ephemeral addresses <xref target="I-D.gont-v6ops-ipv6-addressing-considerations"/>,
        may in turn pose significant challenges on the routing system through its required renewal rate of addresses.</t>
      </section>

      <section anchor="fragility" title="Fragility">

        <t>From the overview of novel routing purposes in <xref target="going_beyond"/>, we can observe that the existence of those additional routing purpose
        adds many purpose-specific translation/adaptation points, responsible for mapping formats from one meaningful context into another. This is in turn creates
        dependency on this additional functionality to exist for endpoints to communicate with the context of the intended purpose. </t>

        <t>While translation/adaptation between purposes and their defining contexts is often not avoidable when going beyond 'mere' reachabiulity, it is the solution-specific
        nature of those components (required for many if not each extended purpose) that is likely to increase the fragility of the resulting system.</t>

        <t>The key problem here is the interaction with other extended purposes that may exist in specific deployments. While needing to operate in the presence of those
        other purpose-specific components, their design has often not taken into account the specific interaction in question. Given the diversity of extension realizations,
        utilizing many, almost any packet field, even beyond and entirely different to its intentded purpose, conflicting behaviour as well as diverging interpretatin of the
        utilized packet information is clearly an issue. Only careful testing of combinations with possible delineation (of purposes) as well as networks may be required, all of which
        further increases the costs for utilizing the extended purposes.</t>

      </section>

      <section anchor="interop" title="Interoperability">
      <t>Although routing extensions are developed with their specific purposes in mind, reflected in requirements and behaviours, they are often realized in
      conjunction with other extensions when it comes to real-world deployments.</t>

      <t>This poses an Interoperability challenge, both in terms of backward as well as forward compability. Feature interactions need investigations,
      often left to operational deployment.</t>

      <t>Building extensions on the basis of agreed packet field semantics is one way to achieve the desired interoperability, unless approaches use extensions to packet fields
      beyond their original intention. As a consequence, translation/adaptation points may be needed to ensure interoperability with other parts of the network, increasing the fragility
      of the system, as discussed in <xref target="fragility"/>.</t>

      <t>Forward compability aims at ensuring that future extensions will continue to be possible, aiming at an overall extensibility of the system beyond its purpose at the time of
      developing a specific solution. IPv6 extension headers are one example of enabling future extensions, although not without their
      own problems in real-world deployments <xref target="SHIMv6ref"/>.</t>
      </section>

    </section>

    <section anchor="semantics" title="The Driving Need for Evolving Communication Semantics">

        <t>When looking at the evolution of routing beyond reachability, the key question arises on how
          the purposes of communication, or more concretely the underlying communication semantics,
          have evolved from the shortest-path routing of packet from sender to a receiver,
          each of those being originally identified through IP locators and captured as a source and
          destination address field in packet headers but having evolved through approaches such as those
          presented in <xref target="going_beyond"/>.</t>

        <t>To better understand this evolution, we distinguish communication in networks according to the relationship between senders
          and receivers and the selection of the paths and endpoints for the delivery of packets, leading us to the following
          distinct semantics.</t>

          <list style="symbols">
            <t>The Unicast semantic consists of sending a packet from a sender to a single receiver.</t>
            <t>In Anycast, a packet is sent from the sender to any one of a set of receivers, where the choice of receiver is made by the network.</t>
            <t>In Multicast, a packet is sent from a sender to all members of a group of receivers.</t>
          </list>

          <t>The identification of endpoints in these semantics may use well-known IP locators for unicast relations or IP multicast groups,
            while Anycast may use an IP anycast address or a content/service name <xref target="NDNref"/><xref target="CARDS"/>.
            Often, packets also carry higher-layer information, such as ports, to facilitate the endpoint-local handling of received
            packets.</t>

          <t>These relationship semantics can be further constrained through path and endpoint selection semantics:</t>

          <list style="symbols">
            <t>Multicast relations may be defined as (i) by configuration, (ii) dynamically formed through a membership
              protocol <xref target="RFC3376"/>, (iii) through requests towards the sender <xref target="I-D.trossen-bier-frrm"/>,
              or (iv) through diffusing towards a sub-group of a larger group, e.g., in Distributed Ledger Technologies (DLTs).</t>
            <t>In Bestcast, the network applies constraints to determine the best path to the receiver based on the destination
              address, the state of the network and the compute resources, and information supplied with the packet.
              Bestcast may also be achieved by extending the anycast address to include multiple virtual unicast representations
              of the same receiver. The choice of a specific receiver may also determine the network path to reach this receiver.
              The choice may be made within the network or using a server-based scheduler and a database akin to DNS Resource
              Records.</t>
            <t>The Chaincast semantic steers a packet through a specific set of nodes deduced from the value of the destination
              address, with typical examples being Service Function Chaining <xref target="RFC7665"/> and Segment Routing Network
              Programming <xref target="RFC8986"/>.</t>
          </list>

           <t>While we can see many examples of those evolving communication semantics, a crucial question
             is 'What are the things that are identified by the identifiers?' <xref target="RTGWGinterim"/>.
             Behind this question is the observation that 'if you want to put multiple definitions into
             the same identifier space, then it requires an architecture discussion.'</t>

          <t>This interjection is key in understanding the architectural dimension of evolving communication semantics since those
            evolved meanings are often based on differently identifying the 'ends' of the communication. Information-centric networking (ICN)
            <xref target="NDNref"/> is one such example, turning the meaning of an address from being a network location into one where the
            address represents a piece of information, with the network being tasked to build ephemeral relations between those network components asking for the information
            and those that may be able to provide it.</t>

          <t>The FRRM (forward request return multicast) <xref target="I-D.trossen-bier-frrm"/> semantic for multicast relations is another approach (albeit related to ICN), where
            the commonality of the forward requests, e.g., in the form of a URL pointing to the same content chunk, identifies the
            communication relation akin to ICN, while path information (e.g., in the form of BIER forwarding information <xref target="RFC8279"/>)
            is used to actually forward the packets from its source to the possible receivers.</t>

          <t>Architectures, such as those for ICN and IP, have long lived in parallel, e.g., with ICN deployed in limited domains
            <xref target="RFC7665"/> or interconnecting to the Internet through dedicated application-level gateways, while proposals such
            as <xref target="HICNref"/> utilize in-address embedding to deploy ICN alongside IP networks.</t>

          <t>The architectural question that arises from this is what the overarching architectural principles as well as its
            resulting frameworks and architectures should look like
            that would allow not only for rich communication semantics to be implemented but also to emerge over time and continued
            to be supported without resorting to gateway and in-lay techniques that all come with complexity and fragility issues?</t>
    </section>

    <section anchor="Next" title="Where to Go From Here?">

    <t>This document outlined the original starting point of the Internet's routing system, namely
    providing 'mere' reachability, and showed through its survey of existing solutions that have since been developed
    that Internet routing has, in fact, evolved into a system that serves many purposes beyond its original 'mere' reachability goal.</t>

    <t>However, the issues we outlined in <xref target="Issues"/> pose the question on how to move forward in the (future)
    evolution of Internet routing. We assert that continuing with a 'business as usual' attitude will ultimately compound
    the identified issues, thereby hampering innovation in novel routing purposes and solutions, and therefore the Internet overall.</t>

    <t>As a way forward, we ask the wider RTG WG community to recognize the following cornerstones for an evolution path for Internet routing:</t>

    <list style="numbers">
      <t>Further evolution of the Internet's routing system MUST take a wider architectural approach in order to break with the point solution
      approach that has led to the identified issues in <xref target="Issues"/>.</t>

      <t>With research and development on routing solutions continuing, as also illustrated in <xref target="I-D.king-irtf-semantic-routing-survey"/>, these
      works MUST be brought into the process of IETF engagement and standardization to increase the understanding of what novel trends, works,
      and possible developments may be just around the corner but also to inform ongoing research and development on paths taken in the IETF.</t>

      <t>The RTG WG SHOULD play a role in the engagement with research and development since the 'Future of Internet Routing' (FIR) is at the heart of
      its charter ("The Routing Area working group (RTGWG) is chartered to provide a venue to discuss, evaluate, support and develop proposals for
      new work in the Routing Area" <xref target="RTGWGref"/>), a role that goes beyond the "specific small topics that do not fit with an
      existing working group" <xref target="RTGWGref"/>.</t>
    </list>

    <t>Following on the cornerstones outlined above, we specifically suggest to the RTG WG, aligned with its charter to consider the following actions:</t>
    <list style="numbers">
      <t>Establish suitable efforts within the RTG WG (e.g., as a sub-group) OR</t>
      <t>Support the establishment of suitable efforts as a standalone FIR WG (or special interest group) OR</t>
      <t>Support the establishment of suitable efforts within the IRTF, where those efforts
      directly liaise with the RTG WG through regular updates in its meetings.</t>
    </list>

    </section>

    <section anchor="security" title="Security Considerations">

      <t><xref target="security_issue"/> outlines a number of security issues that may occur outside the solution-specific security
      considerations, such as interactions between protocol behaviours that were previously untested as a combination. With that in mind,
      security considerations for a wider architectural approach to routing must have the security of the overall routing system as the main
      goal, not merely the security of a single solution. </t>

    </section>

    <section anchor="privacy-consider" title="Privacy Considerations">

      <t>Protecting user privacy is very important. This extends beyond
      ensuring that user data cannot be examined in transit, and also requires
      that a process that inspects the network traffic should not be able to determine
      which applications or what types of application a user is running.</t>

      <t>This makes it critically important to minimize or entirely avoid user and/or application
      information to be directly used for routing purposes. Instead, applications (or users) should express
      requirements for traffic delivery in a manner that does not reveal information about the user.</t>

      <t>Encryption of user data, which is a common technique to protect user privacy, may
      obscure information that has previously been used to perform enhanced routing (such as by
      inspecting or hashing on payload fields), demonstrating that new requirements (here on privacy)
      may negatively impact previously accepted solutions.</t>

    </section>

    <section title="IANA Considerations">

      <t>This draft does not request any IANA action.</t>

    </section>

    <section anchor="acks" title="Acknowledgements">

      <t>Many thanks go to Daniel King, Mohamed Boucadair for their comments to the text
        and to Lixia Zhang for raising important questions related to the possible architectural
        nature of the discussion needed.</t>

    </section>

    <section title="Contributors">

      <figure>
        <artwork align="left">
          <![CDATA[
            Adrian Farrel
            Email: adrian@olddog.co.uk
          ]]>
        </artwork>
      </figure>

    </section>

  </middle>

  <back>
    <references title="Informative References">
      <?rfc include='reference.RFC.1069'?>

      <?rfc include='reference.RFC.1104'?>

      <?rfc include='reference.RFC.1112'?>

      <?rfc include='reference.RFC.1195'?>

      <?rfc include='reference.RFC.1479'?>

      <?rfc include='reference.RFC.2210'?>

      <?rfc include='reference.RFC.2474'?>

      <?rfc include='reference.RFC.2730'?>

      <?rfc include='reference.RFC.2776'?>

      <?rfc include='reference.RFC.2909'?>

      <?rfc include='reference.RFC.2992'?>

      <?rfc include='reference.RFC.3376'?>

      <?rfc include='reference.RFC.3618'?>

      <?rfc include='reference.RFC.3972'?>

      <?rfc include='reference.RFC.4291'?>

      <?rfc include='reference.RFC.4423'?>

      <?rfc include='reference.RFC.4581'?>

      <?rfc include='reference.RFC.4607'?>

      <?rfc include='reference.RFC.4655'?>

      <?rfc include='reference.RFC.4786'?>

      <?rfc include='reference.RFC.5305'?>

      <?rfc include='reference.RFC.5440'?>

      <?rfc include='reference.RFC.6275'?>

      <?rfc include='reference.RFC.6308'?>

      <?rfc include='reference.RFC.6740'?>

      <?rfc include='reference.RFC.6830'?>

      <?rfc include='reference.RFC.7094'?>

      <?rfc include='reference.RFC.7285'?>

      <?rfc include='reference.RFC.7348'?>

      <?rfc include='reference.RFC.7401'?>

      <?rfc include='reference.RFC.7450'?>

      <?rfc include='reference.RFC.7665'?>

      <?rfc include='reference.RFC.7872'?>

      <?rfc include='reference.RFC.8200'?>

      <?rfc include='reference.RFC.8231'?>

      <?rfc include='reference.RFC.8279'?>

      <?rfc include='reference.RFC.8296'?>

      <?rfc include='reference.RFC.8300'?>

      <?rfc include='reference.RFC.8402'?>

      <?rfc include='reference.RFC.8596'?>

      <?rfc include='reference.RFC.8677'?>

      <?rfc include='reference.RFC.8684'?>

      <?rfc include='reference.RFC.8736'?>

      <?rfc include='reference.RFC.8754'?>

      <?rfc include='reference.RFC.8763'?>

      <?rfc include='reference.RFC.8799'?>

      <?rfc include='reference.RFC.8926'?>

      <?rfc include='reference.RFC.8986'?>

      <?rfc include='reference.I-D.ietf-lisp-rfc6830bis'?>

      <?rfc include='reference.I-D.ietf-lisp-rfc6833bis'?>

      <?rfc include='reference.I-D.ietf-teas-rfc3272bis'?>

      <?rfc include='reference.I-D.ietf-v6ops-ipv6-ehs-packet-drops'?>

      <?rfc include='reference.I-D.irtf-panrg-path-properties'?>

      <?rfc include='reference.I-D.irtf-panrg-what-not-to-do'?>

      <?rfc include='reference.I-D.bonica-6man-ext-hdr-update'?>

      <?rfc include='reference.I-D.bryant-arch-fwd-layer-ps'?>

      <?rfc include='reference.I-D.farrel-irtf-introduction-to-semantic-routing'?>

      <?rfc include='reference.I-D.chunduri-lsr-isis-preferred-path-routing'?>

      <?rfc include='reference.I-D.muscariello-intarea-hicn'?>

      <?rfc include='reference.I-D.king-irtf-semantic-routing-survey'?>

      <?rfc include='reference.I-D.li-dyncast-architecture'?>

      <?rfc include='reference.I-D.liu-dyncast-ps-usecases'?>

      <?rfc include='reference.I-D.trossen-icnrg-internet-icn-5glan'?>

      <?rfc include='reference.I-D.ietf-lisp-mn'?>

      <?rfc include='reference.I-D.gont-v6ops-ipv6-addressing-considerations'?>

      <?rfc include='reference.I-D.jia-intarea-internet-addressing-gap-analysis'?>

      <?rfc include='reference.I-D.li-apn-framework'?>

      <?rfc include='reference.I-D.trossen-bier-frrm'?>

https://datatracker.ietf.org/doc/minutes-interim-2022-rtgwg-01-202206210800/

      <reference anchor="RTGWGinterim"
           target="https://datatracker.ietf.org/doc/minutes-interim-2022-rtgwg-01-202206210800/">
      <front>
        <title>Minutes interim-2022-rtgwg-01: Tue 08:00</title>

        <author initials="D." surname="King (ed.)">
          <organization/>
        </author>
        <date year="2022"/>
      </front>
      <seriesInfo name="Minutes"
              value="Minutes RTG WG interim meeting on Semantic Routing at 21.06.2022"/>
      </reference>

      <reference anchor="ICNref"
                 target="https://www.scopus.com/record/display.uri?eid=2-s2.0-84901242669">
        <front>
          <title>A Survey of information-centric networking research</title>

          <author initials="D." surname="Barbera">
            <organization/>
          </author>

          <author initials="G." surname="Xylomenos">
            <organization/>
          </author>

          <author initials="C." surname="Ververidis">
            <organization/>
          </author>

          <author initials="V." surname="Siris">
            <organization/>
          </author>

          <author initials="N." surname="Fotiou">
            <organization/>
          </author>

          <date year="2014"/>
        </front>

        <seriesInfo name="Paper"
                    value="IEEE Communications Surveys and Tutorials, vol. 16, Iss. 2, Q2 2014"/>
      </reference>

      <reference anchor="RINAref">
        <front>
          <title>Patterns in Network Architecture: A Return to
          Fundamentals</title>

          <author initials="J." surname="Day">
            <organization/>
          </author>

          <date year="2008"/>
        </front>

        <seriesInfo name="Book" value="Prentice Hall"/>
      </reference>

      <reference anchor="SCIONref"
                 target="https://link.springer.com/book/10.1007/978-3-031-05288-0">
        <front>
          <title>The Complete Guide to SCION. From Design Principles to Formal Verification</title>

          <author initials="L." surname="Chuat">
            <organization/>
          </author>

          <author initials="M." surname="Legner">
            <organization/>
          </author>

          <author initials="D." surname="Basin">
            <organization/>
          </author>

          <author initials="D." surname="Hausherr">
            <organization/>
          </author>
          <author initials="S." surname="Hitz">
            <organization/>
          </author>
          <author initials="P." surname="Mueller">
            <organization/>
          </author>
          <author initials="A." surname="Perrig">
                                <organization/>
          </author>

          <date year="2022"/>
        </front>

        <seriesInfo name="Book" value="Springer International Publishing AG, 2022."/>
      </reference>

      <reference anchor="PANRGref"
                 target="https://datatracker.ietf.org/rg/panrg/about">
        <front>
          <title>Path Aware Networking Research Group</title>

          <author initials="" surname="">
            <organization/>
          </author>

          <date year=""/>
        </front>

        <seriesInfo name="RG" value="Path Aware Networking Research Group"/>
      </reference>

      <reference anchor="RTGWGref"
                 target="https://datatracker.ietf.org/wg/rtgwg/charter/">
        <front>
          <title>Routing Working Group Charter</title>

          <author initials="" surname="">
            <organization/>
          </author>

          <date year=""/>
        </front>

        <seriesInfo name="WG" value="Routing Working Group"/>
      </reference>

      <reference anchor="CONTENTref"
                 target="https://ieeexplore.ieee.org/iel5/35/5723785/05723809.pdf">
        <front>
          <title>A survey on content-oriented networking for efficient content
          delivery</title>

          <author initials="J." surname="Choi">
            <organization/>
          </author>

          <author initials="J." surname="Han">
            <organization/>
          </author>

          <author initials="E" surname="Cho">
            <organization/>
          </author>

          <date year="2011"/>
        </front>

        <seriesInfo name="Paper"
                    value="IEEE Communications Magazine, 49(3): 121-127, May 2011."/>
      </reference>

      <reference anchor="NDNref" target="">
        <front>
          <title>Named Data Networking</title>

          <author initials="L." surname="Zhang">
            <organization/>
          </author>

          <author initials="A." surname="Afanasyev">
            <organization/>
          </author>

          <author initials="J" surname="Burke">
            <organization/>
          </author>

          <date year="2014"/>
        </front>

        <seriesInfo name="Paper"
                    value="ACM SIGCOMM Computer Communication, Review 44(3): 66-73, 2014"/>
      </reference>

      <reference anchor="HICNref"
                 target="https://www.researchgate.net/publication/336344520_Enabling_ICN_in_the_Internet_Protocol_Analysis_and_Evaluation_of_the_Hybrid-ICN_Architecture">
        <front>
          <title>Enabling ICN in the Internet Protocol: Analysis and
          Evaluation of the Hybrid-ICN Architecture</title>

          <author initials="G." surname="Carofiglio">
            <organization/>
          </author>

          <author initials="L." surname="Muscariello">
            <organization/>
          </author>

          <author initials="J" surname="Auge">
            <organization/>
          </author>

          <author initials="M" surname="Papalini">
            <organization/>
          </author>

          <author initials="M" surname="Sardara">
            <organization/>
          </author>

          <author initials="A" surname="Compagno">
            <organization/>
          </author>

          <date year="2019"/>
        </front>

        <seriesInfo name="Paper"
                    value="Proceedings of the 6th ACM Conference on Information-Centric Networking, 2019."/>
      </reference>

      <reference anchor="CLNPref"
                 target="https://www.iso.org/standard/30931.html">
        <front>
          <title>Protocol for providing the connectionless-mode network
          service: Protocol specification - Part 1</title>

          <author initials="" surname="">
            <organization/>
          </author>

          <date year="1998"/>
        </front>

        <seriesInfo name="standard" value="ISO/IEC 8473-1:1998"/>
      </reference>

      <reference anchor="ISISref"
                 target="https://standards.iso.org/ittf/PubliclyAvailableStandards/c030932_ISO_IEC_10589_2002(E).zip">
        <front>
          <title>Intermediate System to Intermediate System intra-domain
          routeing information exchange protocol for use in conjunction with
          the protocol for providing the connectionless-mode network
          service</title>

          <author initials="" surname="">
            <organization/>
          </author>

          <date year="2002"/>
        </front>

        <seriesInfo name="standard" value="ISO/IEC 10589"/>
      </reference>

      <reference anchor="MBONEref" target="https://www.savetz.com/mbone/">
        <front>
          <title>MBONE: Multicasting Tomorrow&apos;s Internet</title>

          <author initials="K." surname="Savetz">
            <organization/>
          </author>

          <author initials="N." surname="Randall">
            <organization/>
          </author>

          <author initials="Y." surname="Lepage">
            <organization/>
          </author>

          <date year="1996"/>
        </front>

        <seriesInfo name="Book" value="IDG"/>
      </reference>

      <reference anchor="weightedRef" target="https://www.researchgate.net/publication/4083002_Load-balanced_anycast_routing">
        <front>
          <title>Load-balanced anycast routing</title>

          <author initials="C-Y." surname="Lin">
            <organization>National Taiwan University</organization>
          </author>

          <author initials="J-H." surname="Lo">
            <organization>National Taiwan University</organization>
          </author>

          <author initials="S-Y." surname="Kuo">
            <organization>National Taiwan University</organization>
          </author>

          <date year="2004"/>
        </front>

        <seriesInfo name="Paper"
                    value="Proceedings of the Tenth International Conference on Parallel and Distributed Systems, 2004."/>
      </reference>

      <reference anchor="RESEARCHFIAref" target="https://ieeexplore.ieee.org/document/5936152">
        <front>
          <title>A Survey of the Research on Future Internet Architectures</title>
          <author initials="J." surname="Pan">
            <organization></organization>
          </author>
          <author initials="S." surname="Paul">
            <organization></organization>
          </author>
          <author initials="R" surname="Jain">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value="IEEE Communications Magazine, vol. 49, no. 7, July 2011" />
      </reference>

      <reference anchor="DONAref" target="https://dl.acm.org/doi/10.1145/1282380.1282402">
        <front>
          <title>A data-oriented (and beyond) network architecture</title>
          <author initials="T." surname="Koponen">
            <organization></organization>
          </author>
          <author initials="M." surname="Chawla">
            <organization></organization>
          </author>
          <author initials="B.-G." surname="Chun">
            <organization></organization>
          </author>
          <author initials="A." surname="Ermolinskiy">
            <organization></organization>
          </author>
          <author initials="K. H." surname="Kim">
            <organization></organization>
          </author>
          <author initials="S." surname="Shenker">
            <organization></organization>
          </author>
          <author initials="I." surname="Stoica">
            <organization></organization>
          </author>
          <date year="2007"/>
        </front>
        <seriesInfo name="Paper" value="Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, August 2007" />
      </reference>

      <reference anchor="ITUNET2030ref" target="https://www.itu.int/en/ITU-T/focusgroups/net2030/Documents/Network_2030_Architecture-framework.pdf">
        <front>
          <title>Network 2030 Architecture Framework</title>
          <author initials="" surname="">
            <organization></organization>
          </author>
          <date year="2020"/>
        </front>
        <seriesInfo name="Technical Specification" value="ITU-T Focus Group on Technologies for Network 2030" />
      </reference>

      <reference anchor="TOR" target="https://www.torproject.org/">
        <front>
          <title>The Tor Project</title>
          <author initials="" surname="">
            <organization></organization>
          </author>
          <date year="2022"/>
        </front>
        <seriesInfo name="Website" value="Tor Project" />
      </reference>

      <reference anchor="SHIMv6ref" target="https://dl.acm.org/doi/10.1145/1282380.1282402">
        <front>
          <title>Putting SHIM6 into practice</title>
          <author initials="H." surname="Naderi">
            <organization></organization>
          </author>
          <author initials="B. E." surname="Carpenter">
            <organization></organization>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Paper" value="2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)" />
      </reference>

      <reference anchor="ILNP_PRIVACY">
        <front>
          <title>End-to-end privacy for identity and location with IP</title>
          <author initials="S." surname="Bhatti">
            <organization></organization>
          </author>
          <author initials="G." surname="Haywood">
            <organization></organization>
          </author>
          <author initials="R." surname="Yanagida">
            <organization></organization>
          </author>
          <date year="2021"/>
        </front>
        <seriesInfo name="Paper" value="2nd Workshop on New Internetworking Protocols, Architecture and Algorithms, 29th IEEE International Conference on Network Protocols" />
      </reference>

      <reference anchor="CARDS">
        <front>
          <title>CArDS: Dealing a New Hand in Reducing Service Request Completion Times</title>
          <author initials="K." surname="Khandaker">
            <organization></organization>
          </author>
          <author initials="D." surname="Trossen">
            <organization></organization>
          </author>
          <author initials="R." surname="Khalili">
            <organization></organization>
          </author>
          <author initials="Z." surname="Despotovic">
            <organization></organization>
          </author>
          <author initials="A." surname="Hecker">
            <organization></organization>
          </author>
          <author initials="G." surname="Carle">
            <organization></organization>
          </author>
          <date year="2022"/>
        </front>
        <seriesInfo name="Paper" value="IFIP Networking 2022" />
      </reference>
    </references>
  </back>
</rfc>
