<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zzd-idr-sr-policy-scheduling-09" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="BGP SR Policy Scheduling">BGP SR Policy Extensions for Path Scheduling</title>
    <seriesInfo name="Internet-Draft" value="draft-zzd-idr-sr-policy-scheduling-09"/>
    <author initials="L." surname="Zhang" fullname="Li Zhang" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Dong" fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Wang" fullname="Minxue Wang">
      <organization>China Mobile</organization>
      <address>
        <email>wangminxue@chinamobile.com</email>
      </address>
    </author>
    <author initials="N." surname="Nzima" fullname="Nkosinathi Nzima">
      <organization>MTN</organization>
      <address>
        <email>Nkosinathi.Nzima@mtn.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="04"/>
    <area>General</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>Segment Routing (SR) policy enables instantiation of an ordered list of segments with a specific intent for traffic steering. When using SR policy in a time-variant network, delivering the time-variant information associated with paths is necessary in some scenarios.</t>
      <t>This document proposes extensions to BGP SR Policy to deliver the schedule time information of candidate path (segment list) and its associated attributes.</t>
    </abstract>
  </front>
  <middle>
    <?line 59?>

<section anchor="intro">
      <name>Introduction</name>
      <t><xref target="RFC9657"/> introduces a set of time-variant network use cases where the topology of the network changes predictably. When the networks uses traditional routing protocols, it takes these topology changes as unexpected events and may cause and packet loss. However, the topology changes of these networks can be predicted in advance, therefore some measures can be taken in advance to prevent the packet loss. With this idea, <xref target="I-D.ietf-tvr-requirements"/> describes the requirements of using the time-variant information in a network. In <xref section="3.4.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, it describes the centralized routing scenarios with time-variant information, in which the network entities receive the time variable information and traffic forwarding rules directly from a logically centralized source(an Orchestrator or network controller). The time-variant information is especially essential when there is a risk that a logically centralized source may loses connectivity with the network entities.</t>
      <t>Segment Routing (SR) policy <xref target="RFC9256"/> is a set of candidate SR paths consisting of one or more segment lists and necessary path attributes. It describes the traffic forwarding rules for specific flows. <xref target="I-D.ietf-idr-sr-policy-safi"/> introduces how BGP may be used to distribute SR Policy candidate paths. It introduces a BGP SAFI with new NLRI to advertise the candidate paths and specific attributes of a SR Policy from a controller or path computation engine (PCE) to the network entities. However, when using BGP SR Policy in a time-variant network, it can't advertise the schedule time information associated with paths.</t>
      <t>This document proposes extensions to BGP SR Policy to carry the schedule time information of candidate paths/segment lists.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>Most of the time-variant network use cases using BGP SR Policy could be benefit from this work. In some cases, carrying the time-variant information with SR Policy is essential.</t>
      <t>This section describes the cases that requires extending SR Policy with schedule time information.</t>
      <section anchor="network-with-discontinuous-links">
        <name>Network with Discontinuous Links</name>
        <t>In some time-variant network cases, the links between the network entities and network controller may very weak or intermittent, this is very typical in Resource Preservation and Dynamic Reachability network<xref target="RFC9657"/>. In these cases, Real-time SR policy advertising (before changes occur) may not be timely. For example, when a link of an old path is about to be disconnected, the network controller is going to advertise a new path to the headend. However, the link between the headend and the network controller is not available. As a result, the new path cannot be advertised in time, causing packet loss.</t>
        <t>Therefore, in these cases, once the links between the headend and network controller are available, the controller need to advertise the paths with schedule time information for a period in the future to the headend. Then the headend could determine valid paths in the future based on the schedule time information of SR policy.</t>
      </section>
      <section anchor="network-with-frequent-topology-changes">
        <name>Network with Frequent Topology Changes</name>
        <t>There are also some time-variant network cases that topology changes frequently. This is very typical when the number of network entities is very large (For example, a Dynamic Reachability network with hundreds or thousands of nodes). In this kind of time-variant network, a path form one network entity to another changes frequently, sometimes it can only be maintained for a few minutes or seconds.</t>
        <t>Considering that there are multiple paths in a network that computed by the controller, the SR Policies with candidate paths may be advertised to the headend every few seconds. It poses great changeling to the network controller. However, using schedule time information could advertise several paths once, which greatly mitigate the pressure of network controllers.</t>
      </section>
    </section>
    <section anchor="schedule-time-information-in-sr-policy">
      <name>Schedule Time Information in SR Policy</name>
      <t>The NLRI defined in <xref target="I-D.ietf-idr-sr-policy-safi"/> contains the SR Policy candidate path. The content of the SR Policy Candidate Path is encoded in the Tunnel Encapsulation Attribute defined in <xref target="RFC9012"/> using the Tunnel-Type called SR Policy Type with codepoint 15. The SR Policy encoding structure is as follows:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>A candidate path includes multiple SR paths, each of which is specified by a segment list. The schedule time information can be applied to a candidate path, indicating the valid time for each candidate path and its associated attributes.
The new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Schedule Time Information
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>The schedule time information also can be applied to a segment list to indicate the valid time for a segment list and its associated attributes.
The new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Schedule Time Information
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>The Schedule Time Information TLV is either encapsulated at the candidate path level or at the segment list level. It <bcp14>SHOULD NOT</bcp14> be encapsulated at both levels simultaneously.</t>
    </section>
    <section anchor="schedule-time-information-sub-tlv">
      <name>Schedule Time Information Sub-TLV</name>
      <t>The Schedule Time Information sub-TLV defined in this document is used in the SR policy Tunnel TLV, it may be extened to
other type of Tunnel TLVs, but it is out of scope of this document. The Schedule Time Information sub-TLV indicates one
or more valid time slot for one or more paths. It is <bcp14>OPTIONAL</bcp14> and <bcp14>MAY</bcp14> appear more than once in the SR Policy encoding.</t>
      <t>The format of schedule time information sub-TLV is shown as follows:</t>
      <figure anchor="ref-to-fig1">
        <name>Scheduling Time Information Sub-TL</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |Schedule Number|    Reserved   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                        Schedules                              /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>Type: TBD1</t>
      <t>Length: the size of the value field in octets.</t>
      <t>Schedule Number: indicates the number of schedules.</t>
      <t>Schedules: one or more schedules, each schedule indicates the duration when the candidate path (segment list) is active. The format of each schedule is shown as follows:</t>
      <figure anchor="ref-to-fig2">
        <name>Format of Schedules</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           Schedule-id                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Flags  |S|P|R|    Length     |          Reserved             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Start Time                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Start Time(Continue)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       End Time/Duration                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  End Time/Duration(Continue)                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Recurrence count/Bound(Optional)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Recurrence count/Bound(Optional)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Frequency (Optional)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork>
      </figure>
      <t>Schedule-id: 32-bit value, the unique identifier to distinguish each schedule within a SR Policy, this value is allocated by the SR Policy generator.</t>
      <t>Flags: 8 bits, currently only 2 bits are used, the other bits are reserved.</t>
      <t>Length: 8 bits, indicates the length of this schedule in octets.</t>
      <t>S (Schedule type): one-bit flag to indicate the type of a schedule. If S=0, it indicates the schedule only has one instance, the Recurrence Count/Bound, Frequency and Interval field should not be included in the sub-TLV; If S=1, it indicates the schedule has multiple instances, the Recurrence Count/Bound, Frequency and Interval field should be included.</t>
      <t>P (Period type): one-bit flag to indicate the description type of a period. if P=1, then the period is described by a start time filed and an end time field; If P =0, then the period is described by a start time field and a duration time field.</t>
      <t>R (Recurrence bound type): one-bit flag to indicate the how to determine whether the recurrence is end. if R=1, then the end of recurrence is determined by a detail timepoint; If R = 0, then the end of the recurrence is determined by the number of occurrences.</t>
      <t>Start Time: 64-bit value, the number of seconds since the epoch, it indicates when the candidate path (segment list) and its associated attributes start to take effect. The epoch is 1 January 1970 at 00:00 UTC.</t>
      <t>End Time (Duration): 64-bit value, if the flag P=1, then it is the number of seconds since the epoch, it indicates when the candidate path (segment list) and its associated attributes becomes ineffective. If the flag P=0, then it is the number of seconds since the Start Time, it indicates how long the candidate path (segment list) and its associated attributes are effective.</t>
      <t>Recurrence Count/Bound(optional): 64-bit value, this field <bcp14>SHOULD</bcp14> be included when the flag P is set to 1. When the flag R=0, then this field indicates the max number of occurrences. For example, if it is set to 2, then the schedule will repeat twice with the specified Frequency and Interval. When the flag R=1, then tis field indicates the bounded timepoint of recurrence, it is descripted by the number of seconds since the epoch.</t>
      <t>Frequency(optional): 32-bit value, this field should be included when the flag S is set to 1. It is the numbers of seconds since the Start Time of an instance to the Start Time of next instance. This field indicates the recurrence frequency for all the instance of this schedule.</t>
    </section>
    <section anchor="operations">
      <name>Operations</name>
      <section anchor="advertisement-of-sr-policies-with-schedule-time-information">
        <name>Advertisement of SR Policies with Schedule Time Information</name>
        <t>As described in <xref section="4.1" sectionFormat="of" target="I-D.ietf-idr-sr-policy-safi"/>, typically, an SR Policy is computed by a controller or a path computation engine (PCE) and originated by a BGP speaker on its behalf. The schedule time information is also computed by a controller or a PCE which can access to all the predicted topology changes. The predicted topology changes could be got from management interfaces or other means.</t>
        <t>The controller or PCE <bcp14>SHOULD</bcp14> maintain a time-variant event database as described in <xref section="6" sectionFormat="of" target="I-D.zdm-tvr-applicability"/> to store all the predicted information, and compute SR Policies with schedule time information based on the database.</t>
        <t>Each Candidate Path or Segment List may have multiple schedules, each schedule is identified by schedule-id, the controller or PCE <bcp14>MUST</bcp14> make the schedule-id unique within a specific SR Policy.</t>
        <t>if no schedule is included in the Schedule Time Information sub-TLV, then it is assumed that the candidate path or segment list is not time-varing.</t>
      </section>
      <section anchor="reception-of-an-sr-policy-with-schedule-time-information">
        <name>Reception of an SR Policy with Schedule Time Information</name>
        <t>As described in <xref target="I-D.ietf-idr-sr-policy-safi"/>, the BGP SR Policy is distinguished by &lt;distinguisher, color, endpoint&gt; tuple. Whenever a headend receives a SR Policy that it has received before, the SR Policy is considered as the fully replacement of the old one.</t>
        <t>The headend <bcp14>MUST NOT</bcp14> use the SR Policy with schedule time information when it does not have the capability to deal with the schedule time information.</t>
        <section anchor="validation">
          <name>Validation of Schedule Time Information</name>
          <t>On reception of an SR Policy, a BGP speaker first determines if it is valid as described in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-idr-sr-policy-safi"/>.
When a headend receives a SR Policy with Schedule Time Information from it neighbors or controller, it <bcp14>SHOULD</bcp14> perform
schedule time information validation based on the following rules:</t>
          <ul spacing="normal">
            <li>
              <t>When multiple schedules are present within one SR Policy, the schedule-id of each schedules <bcp14>MUST</bcp14> be different. If there
are multiple schedules with the same schedule-id, then the first instance of that schedule is used, and the other instances <bcp14>MUST</bcp14> be ignored.</t>
            </li>
            <li>
              <t>If a SR Policy encapsulates Schedule Time Information sub-TLVs at both candidate path level and segment list level simultaneously,
then the sub-TLVs at segment list level is used, and the sub-TLVs at candidate path level <bcp14>MUST</bcp14> be ignored.</t>
            </li>
            <li>
              <t>The Start Time of Schedule Time Information sub-TLV <bcp14>MUST</bcp14> be later than the time it be received, if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
            <li>
              <t>If the End Time/Duration field is used to indicated the end time, then it <bcp14>MUST</bcp14> be later than the Start Time, if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
            <li>
              <t>If the Frequency field is present in the Schedule Time Information sub-TLV, then it <bcp14>MUST</bcp14> be greater than the difference between the End Time and Start Time(P=1), or greater than the Duration(P=0), if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
            <li>
              <t>If the Recurrence Count/Bound field is present and used to indicate the boundary time point, then it <bcp14>MUST</bcp14> be greater than the End Time(P=1), or greater than the sum of Start Time and Duration(P=0), if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
          </ul>
        </section>
        <section anchor="enabledisable-candidate-pathssegment-lists">
          <name>Enable/Disable Candidate Paths/Segment Lists</name>
          <t>When a headend receives a SR Policy with schedule time information, it <bcp14>SHOULD</bcp14> parse the SR Policy and save the schedule time information locally. When a data packet arrives, it will steer it to a specific SR Policy by color or other means.</t>
          <t>Within a specific SR Policy, the headend dynamically enable/desable different Candidate Paths/Segment Lists based on the schedule time information.</t>
        </section>
      </section>
    </section>
    <section anchor="error-handling-and-fault-management">
      <name>Error Handling and Fault Management</name>
      <t>The error handling actions defined in <xref section="5" sectionFormat="of" target="I-D.ietf-idr-sr-policy-safi"/> are also applicable in this document.</t>
      <t>If a BGP speaker receives a SR Policy with Schedule Time Information but it does not have the capability to deal with the
schedule time information, then the SR Policy <bcp14>SHOULD NOT</bcp14> be considered usable as described in {Section 4.2.2 of !!I-D.ietf-idr-sr-policy-safi}.</t>
      <t>The validation rules defined in <xref target="validation"/> also <bcp14>SHOULD</bcp14> be performed by SRPM to determine if the Schedule Time Information sub-TLV is malformed or invalid.
If the Schedule Time Information sub-TLV is invalid or malformed, then the implementation <bcp14>SHOULD</bcp14> log errors, and the corresponding
candidate path or sgement list <bcp14>MUST NOT</bcp14> be used.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>The specification of BGP models is an ongoing work based on <xref target="I-D.ietf-idr-bgp-model"/> and its future extensions are expected
to cover the SR Policy SAFI and its extensions. Existing BGP operational procedures also apply to the extension specified
in this document.</t>
      <t>The YANG model for the operation and management of SR Policies with Schedule Time Information will be defined in the future.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described in the <xref target="I-D.ietf-idr-sr-policy-safi"/> apply to the extensions described in this document as well.</t>
      <t>The Schedule Time Information TLV defined in this document could provide details about the network operations thant could be sensitive.
Attacker can obtain these sensitive data by snooping BGP messages and select the optimal attack time. Thus suitalbe BGP security mechanisms like
TLS is necessary.</t>
      <t>Time sychronization is essential for schedules, the attackers can attack the network by generating incorrect time synchronization messages
or block the time synchronization process. Therefore, redundant time synchronization mechanisms and secure time synchronization
mechanisms(such as NTS (Network Time Security)) are also necessary.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines a sub-TLV in the registry "BGP Tunnel Encapsulation Attribute sub-TLVs" to be assigned by IANA:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">Schedule Time Information (STI)</td>
            <td align="left">This document</td>
          </tr>
        </tbody>
      </table>
      <t>The type value of this sub-TLV is recommended to be token from the range of 64-125(First Come First Served).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tvr-requirements" target="https://datatracker.ietf.org/doc/html/draft-ietf-tvr-requirements-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tvr-requirements.xml">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>Time-Variant Routing (TVR) refers to calculating a path or subpath through a network where the time of message transmission (or receipt) is part of the overall route computation. This means that, all things being equal, a TVR computation might produce different results depending on the time that the computation is performed without other detectable changes to the network topology or other cost functions associated with the route. This document introduces requirements where TVR computations could improve message exchange in a network.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-05"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="I-D.ietf-idr-sr-policy-safi" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-sr-policy-safi-13" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-sr-policy-safi.xml">
          <front>
            <title>Advertising Segment Routing Policies in BGP</title>
            <author fullname="Stefano Previdi" initials="S." surname="Previdi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Paul Mattes" initials="P." surname="Mattes">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dhanendra Jain" initials="D." surname="Jain">
              <organization>Google</organization>
            </author>
            <date day="6" month="February" year="2025"/>
            <abstract>
              <t>A Segment Routing (SR) Policy is an ordered list of segments (also referred to as instructions) that define a source-routed policy. An SR Policy consists of one or more candidate paths, each comprising one or more segment lists. A headend can be provisioned with these candidate paths using various mechanisms, such as CLI, NETCONF, PCEP, or BGP. This document specifies how BGP can be used to distribute SR Policy candidate paths. It introduces a BGP SAFI for advertising a candidate path of an SR Policy and defines sub-TLVs for the Tunnel Encapsulation Attribute to signal information related to these candidate paths. Furthermore, this document updates RFC9012 by extending the Color Extended Community to support additional steering modes over SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-sr-policy-safi-13"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.zdm-tvr-applicability" target="https://datatracker.ietf.org/doc/html/draft-zdm-tvr-applicability-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.zdm-tvr-applicability.xml">
          <front>
            <title>Applicability of TVR YANG Data Models</title>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>Time-Variant Routing (TVR) is a routing system that can support the predicted topology changes caused by internal or external reasons. Typical use cases include resource preservation networks, operating efficiency networks and dynamic reachability networks. This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying TVR-based technologies.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-02"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9657" target="https://www.rfc-editor.org/info/rfc9657" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9657.xml">
          <front>
            <title>Time-Variant Routing (TVR) Use Cases</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="N. Kuhn" initials="N." surname="Kuhn"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document introduces use cases where Time-Variant Routing (TVR) computations (i.e., routing computations that take into consideration time-based or scheduled changes to a network) could improve routing protocol convergence and/or network performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9657"/>
          <seriesInfo name="DOI" value="10.17487/RFC9657"/>
        </reference>
        <reference anchor="RFC9012" target="https://www.rfc-editor.org/info/rfc9012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9012.xml">
          <front>
            <title>The BGP Tunnel Encapsulation Attribute</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
              <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9012"/>
          <seriesInfo name="DOI" value="10.17487/RFC9012"/>
        </reference>
        <reference anchor="I-D.ietf-idr-bgp-model" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-bgp-model-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-bgp-model.xml">
          <front>
            <title>YANG Model for Border Gateway Protocol (BGP-4)</title>
            <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
              <organization>Kloud Services</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Susan Hares" initials="S." surname="Hares">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>This document defines a YANG data model for configuring and managing BGP, including protocol, policy, and operational aspects, such as RIB, based on data center, carrier, and content provider operational requirements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-model-18"/>
        </reference>
      </references>
    </references>
    <?line 345?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
