<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zzd-idr-sr-policy-scheduling-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.5 -->
  <front>
    <title abbrev="BGP SR Policy Scheduling">BGP SR Policy Extensions for Path Scheduling</title>
    <seriesInfo name="Internet-Draft" value="draft-zzd-idr-sr-policy-scheduling-02"/>
    <author initials="L." surname="Zhang" fullname="Li Zhang" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Dong" fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Wang" fullname="Minxue Wang">
      <organization>China Mobile</organization>
      <address>
        <email>wangminxue@chinamobile.com</email>
      </address>
    </author>
    <author initials="N." surname="Nzima" fullname="Nkosinathi Nzima">
      <organization>MTN</organization>
      <address>
        <email>Nkosinathi.Nzima@mtn.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="29"/>
    <area>General</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>Path scheduling is required in many network scenarios. For example, some links or nodes will be shut down in the tidal network when the traffic decreases, which may lead to the expiration of some routing paths.</t>
      <t>This document proposes extensions to BGP SR Policy to indicate the effective time and expiration time for routing paths to enable path scheduling.</t>
    </abstract>
  </front>
  <middle>
    <?line 60?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Segment Routing (SR) policy <xref target="RFC9256"/> is a set of candidate SR paths consisting of one or more segment lists and necessary path attributes. It enables instantiation of an ordered list of segments with a specific intent for traffic steering. <xref target="I-D.ietf-idr-segment-routing-te-policy"/> specifies how BGP may be used to distribute SR Policy candidate paths. It introduces a BGP SAFI with new NLRI to advertise a candidate path of a Segment Routing (SR) Policy.</t>
      <t><xref target="I-D.zzd-tvr-use-case-tidal-network"/> introduces the tidal network, in which the topology of the network will change periodically over time. The topology change may cause some of the paths invalid, and lead to path reselection or even recalculation. However, the reselection or recalculation takes a period of time, which will affect packet forwarding and cause problems such as packet disorder and packet loss. However, on a network with predictable topology changes, the ingress node knows future topology changes, it can schedule the forwarding paths in advance, and steer flows to different set of paths based on time to prevent packet forwarding from being affected by topology changes.</t>
      <t>In the scenario of SR-policy-based TE paths, the resource allocation efficiency is a big challenge. Some flows just last for a short time, but the TE paths resources for the flows are usually reserved for a long time and can not be used by other services. Therefore, the SR policy originator can generate a policy with time-limited paths and resources, the head node schedules these paths over time to improve the utilization of resources.</t>
      <t>This document proposes extensions to BGP SR Policy to indicate the effective time and expiration time of each candidate path/SR list. The policy originator can deliver multiple paths with different valid time. The ingress node determines the current valid paths based on the arrival time of the packet and forwards along the path.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>This section describes the use cases that may benefit from scheduled paths.</t>
      <section anchor="tidal-network-use-case">
        <name>Tidal network use case</name>
        <t><xref target="I-D.zzd-tvr-use-case-tidal-network"/> introduces the time variant routing scenario in the tidal network, in which the traffic volume varies greatly at different time. In order to reduce the power consumption, some of the links and nodes may be shut down when the traffic is at a low level.</t>
        <t>In this scenario, the SR policy originator can generate a policy with several paths for different topology. The ingress node doesn’t need to wait for the advertisement of topology change and just changes the forwarding path based on the valid time of each path, the affection of topology change is minimized.</t>
      </section>
      <section anchor="resource-utilization-efficiency-use-case">
        <name>Resource utilization efficiency use case</name>
        <t>Traditionally, the usage and allocation of network resources, especially bandwidth, can be supported by a Network Management System (NMS) operation such as path pre-establishment. However, this <bcp14>MAY</bcp14> not provide efficient usage of network resources. The established paths <bcp14>MAY</bcp14> reserve the resources for a long time. During this period, the resources cannot be used by other services even when they are not used for transporting any service.</t>
        <t>In the scenario of SR-policy-based TE path, the resource allocation efficiency is also a problem. Some flows just last for a short period of time, but the TE paths resources for the flows are usually reserved for a long time and cannot be used by other services. 
In this scenario, the controller (originator of the SR policy) can calculate a path with a valid time based on the flow duration. When the TE path is invalid, the ingress node does not steer any packets to the path and releases the resources. Furthermore, the controller can use the resource released by the flow to plan TE paths for other flows that do not have overlap time, which can effectively improve the utilization of network resources.</t>
      </section>
    </section>
    <section anchor="scheduling-time-information-in-sr-policy">
      <name>Scheduling time information in SR Policy</name>
      <t><xref target="RFC8934"/> extends the stateful PCE Communication Protocol (PCEP) to enable Label Switched Path (LSP) path computation, activation, setup, and deletion based on scheduled time intervals for the LSP and the actual network resource usage in a centralized network environment so as to improve the resource utilization efficiency. Similar with <xref target="RFC8934"/>, this document extends the SR Policy to enable paths scheduling.</t>
      <t>The NLRI defined in <xref target="I-D.ietf-idr-segment-routing-te-policy"/> contains the SR Policy candidate path. The content of the SR Policy Candidate Path is encoded in the Tunnel Encapsulation Attribute defined in <xref target="RFC9012"/> using a new Tunnel-Type called SR Policy Type with codepoint 15. The SR Policy encoding structure is as follows:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>A candidate path includes multiple SR paths, each of which is specified by a segment list. The Scheduling time information can be applied to the candidate path, so that all the segment list of each condidate path have the same scheduling time. The new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Scheduling Time Information
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>The Schduling time information also can be applied to each segment list to indicate the valid time for each segment list, the new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Scheduling Time Information
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
    </section>
    <section anchor="scheduling-time-information-sub-tlv">
      <name>Scheduling time information Sub-TLV</name>
      <t>The Scheduling time information sub-TLV has two formats according to the change regularity of network topology. They are Aperiodic Scheduling Time Information (ASTI) sub-TLV and Periodic Scheduling Time Information (PSTI) sub-TLV.</t>
      <section anchor="asti-sub-tlv">
        <name>ASTI sub-TLV</name>
        <t>The ASTI sub-TLV indicates one or more valid time (each includes the enable time and disable time) of one or more SR paths. The format of ASTI sub-TLV is shown as follows:</t>
        <figure anchor="ref-to-fig3">
          <name>ASTI sub-TLV</name>
          <artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |          Group Number         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Index     |                Reserved                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Enable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Disable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                          Variable                             /
|                                                               |
]]></artwork>
        </figure>
        <t>Type: TBD1</t>
        <t>Length: the size of the value field in octets.</t>
        <t>Group Number: indicates the number of information groups, each information group has fields of Index, Flags, Enable Time and Disable time.</t>
        <t>Index: the number used to identify specific information group. This filed will be generated by the originate router.</t>
        <t>Enable Time: the time in seconds indicates when the path(s) is(are) enabled.</t>
        <t>Disable Time: the time in seconds indicates when the path(s) is(are) disabled</t>
        <t>Variable: one or more groups of time information (A information group is composed of Index, Flags, Enable Time and Disable time) may be included in one ASTI sub-TLV.</t>
      </section>
      <section anchor="psti-sub-tlv">
        <name>PSTI sub-TLV</name>
        <t>The PSTI sub-TLV indicates the enable time, disable time and period of one or more paths. The format of PSTI sub-TLV is shown as follows:</t>
        <figure anchor="ref-to-fig4">
          <name>PSTI sub-TLV</name>
          <artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |          Group Number         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Index     |                Reserved                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                            Period                             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Enable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Disable Time                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                          Variable                             /
|                                                               |
]]></artwork>
        </figure>
        <t>Type: TBD2</t>
        <t>Length: the size of the value field in octets.</t>
        <t>Group Number: indicates the number of information groups, each information group has fields of Index, Flags, Period, Enable Time and Disable time.</t>
        <t>Index: the number used to identify specific information group. This filed will be generated by the originate router.</t>
        <t>Period: the time in seconds between the enable time of one repetition and the enable time of the next repetition.</t>
        <t>Enable Time: the time in seconds indicates when the path(s) is(are) enabled.</t>
        <t>Disable Time: the time in seconds indicates when the path(s) is(are) disabled</t>
        <t>Variable: one or more groups of time information(A information group is composed of Index, Flags, Period, Enable Time and Disable time) may be included in one PSTI sub-TLV.</t>
      </section>
    </section>
    <section anchor="procedures">
      <name>Procedures</name>
      <t>When a SR Policy head node receives a SR Policy with scheduling time information, the head node will parse the SR Policy and save the scheduling time information locally. When a data packet arrives, the head node will steer it to a specific SR Policy by color or other means.</t>
      <t>Within a specific SR Policy, there are two ways for the head node to determine the final forwarding SR path:</t>
      <t>Option 1: A valid SR path is dynamically determined based on the packet arrival time whenever a packet arrives.</t>
      <t>Option 2: One or more valid paths are selected for the SR policy and one or more timers are set based on the path disable time. When the timer expires, packets steered to this SR policy are switched to another path.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>These extensions to BGP SR Policy do not add any new security issues to the existing protocol.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines two new sub-TLV in the registry "BGP Tunnel Encapsulation Attribute sub-TLVs" to be assigned by IANA:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">Aperiodic Scheduling Time Information (ASTI) sub-TLV</td>
            <td align="left">This document</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">Periodic Scheduling Time Information (PSTI) sub-TLV</td>
            <td align="left">This document</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="I-D.ietf-idr-segment-routing-te-policy" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-segment-routing-te-policy-23" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-segment-routing-te-policy.xml">
          <front>
            <title>Advertising Segment Routing Policies in BGP</title>
            <author fullname="Stefano Previdi" initials="S." surname="Previdi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Paul Mattes" initials="P." surname="Mattes">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dhanendra Jain" initials="D." surname="Jain">
              <organization>Google</organization>
            </author>
            <date day="25" month="July" year="2023"/>
            <abstract>
              <t>This document introduces a BGP SAFI with two NLRIs to advertise a candidate path of a Segment Routing (SR) Policy. An SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. An SR Policy consists of one or more candidate paths, each consisting of one or more segment lists. A headend may be provisioned with candidate paths for an SR Policy via several different mechanisms, e.g., CLI, NETCONF, PCEP, or BGP. This document specifies how BGP may be used to distribute SR Policy candidate paths. It defines sub-TLVs for the Tunnel Encapsulation Attribute for signaling information about these candidate paths. This documents updates RFC9012 with extensions to the Color Extended Community to support additional steering modes over SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-segment-routing-te-policy-23"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.zzd-tvr-use-case-tidal-network" target="https://datatracker.ietf.org/doc/html/draft-zzd-tvr-use-case-tidal-network-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.zzd-tvr-use-case-tidal-network.xml">
          <front>
            <title>Use Case of Tidal Network</title>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Tianran Zhou" initials="T." surname="Zhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei</organization>
            </author>
            <date day="9" month="July" year="2023"/>
            <abstract>
              <t>The tidal effect of traffic is very typical on our network, this document introduces the time variant routing scenario in the tidal network, and then describes the assumptions and routing impacts based on the use case. Finally, an exempar of tidal network is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-zzd-tvr-use-case-tidal-network-01"/>
        </reference>
        <reference anchor="RFC8934" target="https://www.rfc-editor.org/info/rfc8934" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8934.xml">
          <front>
            <title>PCE Communication Protocol (PCEP) Extensions for Label Switched Path (LSP) Scheduling with Stateful PCE</title>
            <author fullname="H. Chen" initials="H." role="editor" surname="Chen"/>
            <author fullname="Y. Zhuang" initials="Y." role="editor" surname="Zhuang"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines a set of extensions to the stateful PCE Communication Protocol (PCEP) to enable Label Switched Path (LSP) path computation, activation, setup, and deletion based on scheduled time intervals for the LSP and the actual network resource usage in a centralized network environment, as stated in RFC 8413.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8934"/>
          <seriesInfo name="DOI" value="10.17487/RFC8934"/>
        </reference>
        <reference anchor="RFC9012" target="https://www.rfc-editor.org/info/rfc9012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9012.xml">
          <front>
            <title>The BGP Tunnel Encapsulation Attribute</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
              <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9012"/>
          <seriesInfo name="DOI" value="10.17487/RFC9012"/>
        </reference>
      </references>
    </references>
    <?line 292?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
