<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zzd-idr-sr-policy-scheduling-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="BGP SR Policy Scheduling">BGP SR Policy Extensions for Path Scheduling</title>
    <seriesInfo name="Internet-Draft" value="draft-zzd-idr-sr-policy-scheduling-01"/>
    <author initials="L." surname="Zhang" fullname="Li Zhang" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Dong" fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Wang" fullname="Minxue Wang">
      <organization>China Mobile</organization>
      <address>
        <email>wangminxue@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>General</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>Path scheduling is required in many network scenarios. For example, some links or nodes will be shut down in the tidal network when the traffic decreases, which may lead to the expiration of some routing paths.</t>
      <t>This document proposes extensions to BGP SR Policy to indicate the effective time and expiration time for routing paths to enable path scheduling.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Segment Routing (SR) policy <xref target="RFC9256"/> is a set of candidate SR paths consisting of one or more segment lists and necessary path attributes. It enables instantiation of an ordered list of segments with a specific intent for traffic steering. <xref target="I-D.ietf-idr-segment-routing-te-policy"/> specifies how BGP may be used to distribute SR Policy candidate paths. It introduces a BGP SAFI with new NLRI to advertise a candidate path of a Segment Routing (SR) Policy.</t>
      <t><xref target="I-D.zzd-tvr-use-case-tidal-network"/> introduces the tidal network, in which the topology of the network will change periodically over time. The topology change may cause some of the paths invalid, and lead to path reselection or even recalculation. However, the reselection or recalculation takes a period of time, which will affect packet forwarding and cause problems such as packet disorder and packet loss. However, on a network with predictable topology changes, the ingress node knows future topology changes, it can schedule the forwarding paths in advance, and steer flows to different set of paths based on time to prevent packet forwarding from being affected by topology changes.</t>
      <t>In the scenario of SR-policy-based TE paths, the resource allocation efficiency is a big challenge. Some flows just last for a short time, but the TE paths resources for the flows are usually reserved for a long time and can not be used by other services. Therefore, the SR policy originator can generate a policy with time-limited paths and resources, the head node schedules these paths over time to improve the utilization of resources.</t>
      <t>This document proposes extensions to BGP SR Policy to indicate the effective time and expiration time of each candidate path/SR list. The policy originator can deliver multiple paths with different valid time. The ingress node determines the current valid paths based on the arrival time of the packet and forwards along the path.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>This section describes the use cases that may benefit from scheduled paths.</t>
      <section anchor="tidal-network-use-case">
        <name>Tidal network use case</name>
        <t><xref target="I-D.zzd-tvr-use-case-tidal-network"/> introduces the time variant routing scenario in the tidal network, in which the traffic volume varies greatly at different time. In order to reduce the power consumption, some of the links and nodes may be shut down when the traffic is at a low level.</t>
        <t>In this scenario, the SR policy originator can generate a policy with several paths for topology1 and topology2. The ingress node doesn’t need to wait for the advertisement of topology change and just changes the forwarding path based on the valid time of each path, the affection of topology change is minimized.</t>
      </section>
      <section anchor="resource-utilization-efficiency-use-case">
        <name>Resource utilization efficiency use case</name>
        <t>Traditionally, the usage and allocation of network resources, especially bandwidth, can be supported by a Network Management System (NMS) operation such as path pre-establishment. However, this <bcp14>MAY</bcp14> not provide efficient usage of network resources. The established paths <bcp14>MAY</bcp14> reserve the resources for a long time. During this period, the resources cannot be used by other services even when they are not used for transporting any service.</t>
        <t>In the scenario of SR-policy-based TE path, the resource allocation efficiency is also a problem. Some flow just lasts for a short period of time, but the TE path resources for the flow are usually reserved for a long time and cannot be used by other services. 
In this scenario, the controller (originator of the SR policy) can calculate a path with a valid time based on the flow duration. When the TE path is invalid, the ingress node does not steer any packets to the path and releases the resources. Furthermore, the controller can use the resource released by the flow to plan TE paths for other flows that do not have overlap time, which can effectively improve the utilization of network resources.</t>
      </section>
    </section>
    <section anchor="scheduling-time-information-in-sr-policy">
      <name>Scheduling time information in SR Policy</name>
      <t><xref target="RFC8934"/> extends the stateful PCE Communication Protocol (PCEP) to enable Label Switched Path (LSP) path computation, activation, setup, and deletion based on scheduled time intervals for the LSP and the actual network resource usage in a centralized network environment so as to improve the resource utilization efficiency. Similar with <xref target="RFC8934"/>, this document extends the SR Policy to enable paths scheduling.</t>
      <t>The NLRI defined in <xref target="I-D.ietf-idr-segment-routing-te-policy"/> contains the SR Policy candidate path. The content of the SR Policy Candidate Path is encoded in the Tunnel Encapsulation Attribute defined in <xref target="RFC9012"/> using a new Tunnel-Type called SR Policy Type with codepoint 15. The SR Policy encoding structure is as follows:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>A candidate path includes multiple SR paths, each of which is specified by a segment list. The Scheduling time information can be applied to the candidate path, so that all the segment list of each condidate path have the same scheduling time. The new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Scheduling Time Information
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>The Schduling time information also can be applied to each segment list to indicate the valid time for each segment list, the new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Scheduling Time Information
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
    </section>
    <section anchor="scheduling-time-information-sub-tlv">
      <name>Scheduling time information Sub-TLV</name>
      <t>The Scheduling time information sub-TLV has two formats according to the change regularity of network topology. They are Aperiodic Scheduling Time Information (ASTI) sub-TLV and Periodic Scheduling Time Information (PSTI) sub-TLV.</t>
      <section anchor="asti-sub-tlv">
        <name>ASTI sub-TLV</name>
        <t>The ASTI sub-TLV indicates one or more valid time (each includes the enable time and disable time) of one or more SR paths. The format of ASTI sub-TLV is shown as follows:</t>
        <figure anchor="ref-to-fig3">
          <name>ASTI sub-TLV</name>
          <artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |          Group Number         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Index     |                Reserved                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Enable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Disable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                          Variable                             /
|                                                               |
]]></artwork>
        </figure>
        <t>Type: TBD1</t>
        <t>Length: the size of the value field in octets.</t>
        <t>Group Number: indicates the number of information groups, each information group has fields of Index, Flags, Enable Time and Disable time.</t>
        <t>Index: the number used to identify specific information group. This filed will be generated by the originate router.</t>
        <t>Enable Time: the time in seconds indicates when the path(s) is(are) enabled.</t>
        <t>Disable Time: the time in seconds indicates when the path(s) is(are) disabled</t>
        <t>Variable: one or more groups of time information (A information group is composed of Index, Flags, Enable Time and Disable time) may be included in one ASTI sub-TLV.</t>
      </section>
      <section anchor="psti-sub-tlv">
        <name>PSTI sub-TLV</name>
        <t>The PSTI sub-TLV indicates the enable time, disable time and period of one or more paths. The format of PSTI sub-TLV is shown as follows:</t>
        <figure anchor="ref-to-fig4">
          <name>PSTI sub-TLV</name>
          <artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |          Group Number         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Index     |                Reserved                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                            Period                             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Enable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Disable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                          Variable                             /
|                                                               |
]]></artwork>
        </figure>
        <t>Type: TBD2</t>
        <t>Length: the size of the value field in octets.</t>
        <t>Group Number: indicates the number of information groups, each information group has fields of Index, Flags, Period, Enable Time and Disable time.</t>
        <t>Index: the number used to identify specific information group. This filed will be generated by the originate router.</t>
        <t>Period: the time in seconds between the enable time of one repetition and the enable time of the next repetition.</t>
        <t>Enable Time: the time in seconds indicates when the path(s) is(are) enabled.</t>
        <t>Disable Time: the time in seconds indicates when the path(s) is(are) disabled</t>
        <t>Variable: one or more groups of time information(A information group is composed of Index, Flags, Period, Enable Time and Disable time) may be included in one PSTI sub-TLV.</t>
      </section>
    </section>
    <section anchor="procedures">
      <name>Procedures</name>
      <t>When a SR Policy head node receives a SR Policy with scheduling time information, the head node will parse the SR Policy and save the scheduling time information locally. When a data packet arrives, the head node will steer it to a specific SR Policy by color or other means.</t>
      <t>Within a specific SR Policy, there are two ways for the head node to determine the final forwarding SR path:</t>
      <t>Option 1: A valid SR path is dynamically determined based on the packet arrival time whenever a packet arrives.</t>
      <t>Option 2: One or more valid paths are selected for the SR policy and one or more timers are set based on the path disable time. When the timer expires, packets steered to this SR policy are switched to another path.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>These extensions to BGP SR Policy do not add any new security issues to the existing protocol.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines two new sub-TLV in the registry "BGP Tunnel Encapsulation Attribute sub-TLVs" to be assigned by IANA:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">Aperiodic Scheduling Time Information (ASTI) sub-TLV</td>
            <td align="left">This document</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">Periodic Scheduling Time Information (PSTI) sub-TLV</td>
            <td align="left">This document</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="I-D.ietf-idr-segment-routing-te-policy" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-segment-routing-te-policy-20" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-idr-segment-routing-te-policy.xml">
          <front>
            <title>Advertising Segment Routing Policies in BGP</title>
            <author fullname="Stefano Previdi" initials="S." surname="Previdi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Arrcus Inc</organization>
            </author>
            <author fullname="Paul Mattes" initials="P." surname="Mattes">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dhanendra Jain" initials="D." surname="Jain">
              <organization>Google</organization>
            </author>
            <author fullname="Steven Lin" initials="S." surname="Lin">
              <organization>Google</organization>
            </author>
            <date day="27" month="July" year="2022"/>
            <abstract>
              <t>This document introduces a BGP SAFI with two NLRIs to advertise a candidate path of a Segment Routing (SR) Policy. An SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. An SR Policy consists of one or more candidate paths, each consisting of one or more segment lists. A headend may be provisioned with candidate paths for an SR Policy via several different mechanisms, e.g., CLI, NETCONF, PCEP, or BGP. This document specifies how BGP may be used to distribute SR Policy candidate paths. It defines sub-TLVs for the Tunnel Encapsulation Attribute for signaling information about these candidate paths. This documents updates RFC9012 with extensions to the Color Extended Community to support additional steering modes over SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-segment-routing-te-policy-20"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.zzd-tvr-use-case-tidal-network" target="https://datatracker.ietf.org/doc/html/draft-zzd-tvr-use-case-tidal-network-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.zzd-tvr-use-case-tidal-network.xml">
          <front>
            <title>Use Case of Tidal Network</title>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Tianran Zhou" initials="T." surname="Zhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei</organization>
            </author>
            <date day="25" month="March" year="2023"/>
            <abstract>
              <t>The tidal effect of traffic is very typical on our network, this document introduces the time variant routing scenario in the tidal network, and then describes the assumptions and routing impacts based on the use case. Finally, an exempar of a network to the use case is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-zzd-tvr-use-case-tidal-network-00"/>
        </reference>
        <reference anchor="RFC8934" target="https://www.rfc-editor.org/info/rfc8934" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8934.xml">
          <front>
            <title>PCE Communication Protocol (PCEP) Extensions for Label Switched Path (LSP) Scheduling with Stateful PCE</title>
            <author fullname="H. Chen" initials="H." role="editor" surname="Chen"/>
            <author fullname="Y. Zhuang" initials="Y." role="editor" surname="Zhuang"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines a set of extensions to the stateful PCE Communication Protocol (PCEP) to enable Label Switched Path (LSP) path computation, activation, setup, and deletion based on scheduled time intervals for the LSP and the actual network resource usage in a centralized network environment, as stated in RFC 8413.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8934"/>
          <seriesInfo name="DOI" value="10.17487/RFC8934"/>
        </reference>
        <reference anchor="RFC9012" target="https://www.rfc-editor.org/info/rfc9012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9012.xml">
          <front>
            <title>The BGP Tunnel Encapsulation Attribute</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
              <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9012"/>
          <seriesInfo name="DOI" value="10.17487/RFC9012"/>
        </reference>
      </references>
    </references>
    <?line 287?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1b23Ibtxm+36dA5RspJRlLtpOYkyaRJTlWRpJZkY4n7fQC
3IVIxMsFA2BF0YdMX6N3fZY+Sp+k/wHYA0nJlpOmbsbrGUuLxeE//x9+QN1u
N/Ha56ovHn07EMNzMTC5Tpfi6MqrwmlTOHFhrBhIPxXDdKqyMtfFJJHjsVWX
q4MaHTKTFnIG02ZWXvjuy5dZV2e262x3Tn27rurbvbubmLEzufLK9ZNynkn6
BX/0kxT+nxi77Avns8SV45l2SNdoOYfZj49Gj5NEz21feFs6v3f37sO7e4m0
SvbFt6pQVubJwtgXE2vKOfQ/PE9eqCW0ZPBSeGUL5buHSGOSyNJPje0nopsI
oQvXFyc98ZepBHaEYG5OdNVg7EQW+qX0QExfPCnlQmloVjOp8754ib1yfe/+
/W+m9KmXmhl8tgZlrTLtjYVX561SHuSo9E8gCnFuZAbNqfZLavxR01qpKQuP
MjiY6kI2CBwhgaas6BtpWVhZxMa30WhKzwNaRFazf9cTh6bB/XdaxYabZ/5R
q14GHTdPe9oTz5tCPdXFValiW3tmYlicmrHOVT3/ArrOaNQ3KXaY0XdaJimM
ncHgS7CdRBcX9ZtIer1eknS7XSHHIHiZgs7JsGtbFNoJq34qtVUZECtmslgK
MBE0IeimCmm1cT3xGHxCXcnZPFcd4cxMCRj9wgHxojCZcmKh81yMlXDT0ovM
LAqczU+V8DqTeTXlYqpCM5jghU5FplKwXadcB77pdAoULEWuZCa8oY7qaq4t
CUeYC17aohqB9jnwArQlyWgKbIAHljNVeDG3Zm5gRhha+TRM1nZdaNBFptHb
eJmLC5Wi3IBgWEIWWXNlasO40FoaJwEJjXNF7w2xgthJ7jOdZaDH5A76njVZ
mdJ0r+5ofH2TJEM1IZrPw7zbw/MdwRFDvHr1h/PHBw/3Hnz25g3qSQqnPAoh
Beo0RgvkhylJgUntaAroYAqFmpkZCwoJK+Tw2RFfhUqVc9IumWrpvdXjEkJQ
Txz7wJBDy/WyAHeJogcvgyii0FBwLtIGz43ax4mEm6tUo1aBPVwTJRYV7bxS
FkWDfB13D3ta+QuOkTxLN8i261WImcB2mBHomZoFqRDtA+ysdIpMJANSmPyG
cmsBBRMBvnRQgEJBki3sPz5mwgu1EGcn58c4n8wulfXagQmsTEMyEBsVxsuC
0l+9+hpZw+jvL20XiOymYNxdcoJucALUZk3Mmo900HPYF+gbGHNuJktcHt8r
T0KHSzHqAnkgWYPGnOfQDxggg+2JUXN86IvySyVQxr4UZmUr0sWlzHXWITOJ
Tki8W+VUrth6MRRcghtbBQumZU4W0hNPzAKabYfmW+nf6iq8fEFaYLKJBCA3
BgBiTJI7wtrpC0V2tJA2Q3kjZUw+uDkY6swJV8Io6WJnsAiyU+oa2nLjXINC
oEE2BAn8zcGsderJl1ck5pgjWByYchTuxIvCLAAolL60m/prj7YT4wEHmAYP
UdhobLJIFcubHERc5DgzGTaIwKKpBa/nUWOJhh9DEqrHojI2ierCmhm4CkmN
xAkDx8s1csFsjzkmx3iPqw3PI3DhFUdHTEClXlPaFJwkz03KWlXo5loV4H8U
rMZ6gkvkuYJVemKI1sbc/QjAReTScYCAsAEoxAcbAE+mFeJ61VKMy0iSNAlA
HggCJZk8Wpu9BCp5vhwycR3GUROF8VXQABEYmMYKHKNTDHvgJ1bBWMXcYVTl
QGKsnkC6BexC00wIYHmMDaEDGQ8u1c31TKOEmWpcuKKcZ52iP5H1RLsg53fR
+Sq/pdw0A/O+ZMuBQJMHfICaqabt/VaJDxZVEnysHQ8/hTkxEXCY2SywTOUa
2ZqVudfzPLJKUqsNnIJOI2S1XC0DlGwB+4RQmZa2MWbVJ6CDtFbDx4pyjm7k
G8hb8A/QEFtJiH2YsO/cEecMhTipnYB7lHKiUMzg8gq0bXDk1umz4Wirwz/F
2VP6/fzoz8+Oz48O8ffhk/2Tk+qXJPQYPnn67OSw/q0eefD09PTo7JAHQ6to
NSVbp/s/bHGM2Ho6GB0/Pds/2WJ41dS+pFCEZo7Z10JcQHOULgF4lkKKZID3
6GDwr3/u3g/gYm939yGkI375Yvfz+/CCEI1XMwX4Fr+CnJaJnM+VtBS4MPfI
ufYyB+uG2AsuDJAP3Qgk+clfUTJ/64svx+l89/5XoQEZbjVGmbUaSWbrLWuD
WYgbmjYsU0mz1b4i6Ta9+z+03qPcG41ffg1IT4nu7hdff4XWA6Ad3IjdJnim
CxkwaoBNGJMXogJ8kz4AmkJdQNagkB3DQzDvHlnmqAWj4xS/AHGAd1xCsAeI
V4HaKv5vgu6rsCTAukuTl2EqmBr8VnowGukb7s2OfRzgI9ooJFughJ0PcrIl
+FrO5iisTguX8C6DUCttMwL6q3cZaxsKzD2eksACIMylynGDcBycJXL4fnHe
IXoAiXDUoXQUcukukRjf9jaFMaNc8e+//8ODPBm5LqT2VU6rYCe5MjK/Attw
fsqbIWtvwhTtQFhH1SqAYydmnQFByCira4GgIOBCPnupsiowhoTfTEaNjF8b
5MhK2OzDZ8zMnWDwMnDQgAuwbrTmRqJUBPgpqY9hwEJnSDHqBLVezueAFDiH
S3EWhp/KAuYnwQ2XgKJmYvvsdLgjzFyFLFYjRIZ6XeUQ6mk3xVEt6Aq8g+8T
YMAMrDNVsekDI5soZ41X01Y4AOcK6KQFnNwqVOmJwxK3R0wCI+POyhAQw41A
hmF59IglZQQcQL3DXqxwKEJG0ss4sifEbUDgO2PA3Bl0IQbqDQhYI0DXgoCr
G4IVMHgNFrwVFHwLErwmUkB8gvAJUNaK7UasCEGqiiM7ZKlxq0PhA8kOu+OG
Q7YclXjIShv2Uc9jRItc68bGbG0ngnGFlMzbB1Qqox0XCyi8ySc8mquQdlTT
ch+XFqUwq/Bvg1vkB327pfAwEe8mIgO4FcmhdwXcUQEs3rCnwWSXGSJ2KsEf
EPDmct7a/OF6FSIFdd6Ag9d9EJNwXZJlSVcVMUMVqQoHU+ZE0PPwHoIeQswZ
iwac2KuLMheDgyNxYGazstDBvgfWeJOaXGzDt8FOowB0IscqF0NQNRLA9ePt
kyH0IfmnZjYvveQEJ9MIFDq4uSvnDLcALCtapbKOGgkEXgDXgSHU5g8LcObB
kJ76sgERKm1x0ELQJsCmIQTkGNerfqq41NYUFD7RXd3q9sPeHPrBrSFT5IAL
ycybUu2sINSmkFsbkkYRzbWraBhVqTSTAT4qGMLepn6Epix1sbpmeyfDwRu7
xuTb6nxQdR4EdwS+wfeyiJNGZVGA8o8KgMQuFjn2Y1mtTTpK5+Hd3T2grXQU
hqn8xFN0sciP8QNVXhNArSRdXHZuwA7E7gOmuu5FRBGM87ZMqTKBMRiNJUcH
7EMm//nnn5PG8QVWwFC6AGoPuXpYYvKCRMg9ugeAC+DtqMho1a8SQU/FG0wq
4vMWKWzv3dupO9f9+VyjJmp790G7Hz6PcMsKrA2PD9e+Dc8vP7uxwwD29ohE
U7Xhk4Zw7pfrH5iYMznbMGijWWzsenQ1h76A886ewRaGY0Tk8+jsZLDOaawv
noA+1j7i81zpyXTzpzD21t/wmGBTG1pLsr9aBtVFmpeExeOmPlahO4wywYE4
mGMaDfXbANmaxehgvzfE6wD7YNuZa1UdCLTJwe0Cpxbck1L4bqxRly5MiwfK
P9QZtNY8DqmLEOiVb3MudTXHTEzbbKAUvOyjk/1fOFmt8BEa3XFtdB++Qwav
uc5pCHSvew55Qcs1VguBDXiK8GJtQCccP3x0i4YSf19u8TZTv43f4PNbu8bN
8H9Yjrujk+8rD7q2o+OOkCUANy6M4C+ApdLUcLUlpiKul1g1AZtDXTb3JbGq
QumEN+P78aDuJkmK7f3h6HinogLx/eCdxg2a47hsiFPFFma82VIFANc6Mm5E
gm0KA1XKpwMDBuvVpjrTrmrYWT19jtCAcyrTin3aVMT68TpYvbvBBHY3tO1t
aLsHo3fhyz1xXzwQn4nPxRfiobhFW/LH7i/8l7wmSgjA08PvJ6qYgNtW7/R8
izd2xFk5G8OWOT6vfzUajotMXYmVNfk5jzWTzc+vR8PG54jticz52ue/S8Nh
MOH/JQ3v9rxOPr3+4/dYz0c+bno+/RVoQM981Rd3ILl1vele6Mk9Ieha3Z+2
mp699QZiDuXY0aPD3SRhu+8z8tYvqyo/BJwSooNWOe2STeqVx3JO0yX6jWBF
QIQdBWZohm669hY3ImsfKKLTMg4Hkkt0xONcTlynZYcY1w4bcY3OyKFzv7l0
vIKiM0hW+mLZvP6ysjCGP41L48Y+XpWKpwxVHS1WFvmGk7KwaoOofn1wAzJy
Crc0riGU6iQEA+6224Gwug1JZycEbKzkN+38vacL8T5Lkmhv/VbIZxXEIm5L
Ftv7G3SiHVXHDNW8bqOUnXgaFNIT207RTnGcBgdraXCwOQ2uJLhOK7vxjZKq
Rt1kemOSG3xMch+TXHwYwt3U42Oi/W3k8E7Ph5po71eJdnBdot37wBPtIBxu
fpAJl4nbnBzHsLNTISs2d0EhF1g1V15zESacyaz04gLKlW90/b3l+Nun+Hcx
h2tT/WAl1eMJXQo7ZKtcktBJqmzUd+oreFalSl/SLdT6M1/yuL4wsHqPj+xq
Lm04H60nouucVYn5hkoDHpzn+TIc+kqRSS+r22p4kW398iAtyoe9mop4jWvX
NQVg4CnWz0R1CDtTsqDL8s+BSzoNXB9Ga1nFV8kWeEVlWZ811iTg7dR4K48P
gMGJ8uZtlLDtB4DzlC71iN2+2A91hfANjSJbFnIWri1XM2bt0/GmNOK1PrRb
vLAhVoXVqxbc64unayWNcDeTbsXnfCE2clffBeKbb/VQXNHGUX6VOLrI2Ihb
9fE9jeO7lKjFeCpPqounGSCDxsK4QjxARsUWrLlwP/GOGKq0pCrTAd72z8Lt
FkeA1qkbb32Gc3eZZYL/wmOB4YBn086VqrouoK7C3xHMw1k3LX28f7a/umz7
8imfcnLBjKavsHU4RZ7gTf2l2ELC3lKvDWPdVrjQKJ3Tk4LjNlICdvUakjDm
stfikC7XsdZfA8wL9VbInq+7/MSf62/Qh7amiBffqzgH49piCDPu4Zf3qNqJ
TTPSn5KMwX4SfP4DAqUpCcM2AAA=

-->

</rfc>
