<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zzd-idr-sr-policy-scheduling-10" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGP SR Policy Scheduling">BGP SR Policy Extensions for Path Scheduling</title>
    <seriesInfo name="Internet-Draft" value="draft-zzd-idr-sr-policy-scheduling-10"/>
    <author initials="L." surname="Zhang" fullname="Li Zhang" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Dong" fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Wang" fullname="Minxue Wang">
      <organization>China Mobile</organization>
      <address>
        <email>wangminxue@chinamobile.com</email>
      </address>
    </author>
    <author initials="N." surname="Nzima" fullname="Nkosinathi Nzima">
      <organization>MTN</organization>
      <address>
        <email>Nkosinathi.Nzima@mtn.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="16"/>
    <area>General</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>Segment Routing (SR) policy enables instantiation of an ordered list of segments with a specific intent for traffic steering. When using SR policy in a a network with time-variant characterics or requires high resources utilization efficiency, delivering the time-variant information associated with paths is necessary.</t>
      <t>This document proposes extensions to BGP SR Policy to deliver the schedule time information of candidate paths and segment lists.</t>
    </abstract>
  </front>
  <middle>
    <?line 59?>

<section anchor="intro">
      <name>Introduction</name>
      <t><xref target="RFC9657"/> introduces a set of time-variant network use cases where the topology of the network changes predictably. When the networks uses traditional routing protocols, it takes these topology changes as unexpected events and may cause and packet loss. However, the topology changes of these networks can be predicted in advance, therefore some measures can be taken in advance to prevent the packet loss. With this idea, <xref target="I-D.ietf-tvr-requirements"/> describes the requirements of using the time-variant information in a network. In <xref section="3.4.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, it describes the centralized routing scenarios with time-variant information, in which the network entities receive the time variable information and traffic forwarding rules directly from a logically centralized source(an Orchestrator or network controller). The time-variant information is especially essential when there is a risk that a logically centralized source may loses connectivity with the network entities.</t>
      <t><xref target="RFC8934"/> provides a set of extensions to PCEP to enable LSP scheduling for LSP creation/deletion under the stateful control of a PCE and according to traffic service requests from customers, so as to improve the usage of network resources.</t>
      <t>Segment Routing (SR) policy <xref target="RFC9256"/> is a set of candidate SR paths consisting of one or more segment lists and necessary path attributes. It describes the traffic forwarding rules for specific flows. <xref target="I-D.ietf-idr-sr-policy-safi"/> introduces how BGP may be used to distribute SR Policy candidate paths. It introduces a BGP SAFI with new NLRI to advertise the candidate paths and specific attributes of a SR Policy from a controller or path computation engine (PCE) to the network entities. However, when using BGP SR Policy in a network with time-variant characterics or requires high resources utilization efficiency, it can't advertise the schedule time information associated with paths.</t>
      <t>This document proposes extensions to BGP SR Policy to carry the schedule time information of candidate paths/segment lists.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>Most of the time-variant network use cases using BGP SR Policy could be benefit from this work. In some cases, carrying the time-variant information with SR Policy is essential.</t>
      <t>This section describes the cases that requires extending SR Policy with schedule time information.</t>
      <section anchor="networks-with-discontinuous-links">
        <name>Networks with Discontinuous Links</name>
        <t>In some time-variant network cases, the links between the network entities and network controller may very weak or intermittent, this is very typical in Resource Preservation and Dynamic Reachability network<xref target="RFC9657"/>. In these cases, Real-time SR policy advertising (before changes occur) may not be timely. For example, when a link of an old path is about to be disconnected, the network controller is going to advertise a new path to the headend. However, the link between the headend and the network controller is not available. As a result, the new path cannot be advertised in time, causing packet loss.</t>
        <t>Therefore, in these cases, once the links between the headend and network controller are available, the controller need to advertise the paths with schedule time information for a period in the future to the headend. Then the headend could determine valid paths in the future based on the schedule time information of SR policy.</t>
      </section>
      <section anchor="networks-with-frequent-topology-changes">
        <name>Networks with Frequent Topology Changes</name>
        <t>There are also some time-variant network cases that topology changes frequently. This is very typical when the number of network entities is very large (For example, a Dynamic Reachability network with hundreds or thousands of nodes). In this kind of time-variant network, a path form one network entity to another changes frequently, sometimes it can only be maintained for a few minutes or seconds.</t>
        <t>Considering that there are multiple paths in a network that computed by the controller, the SR Policies with candidate paths may be advertised to the headend every few seconds. It poses great changeling to the network controller. However, using schedule time information could advertise several paths once, which greatly mitigate the pressure of network controllers.</t>
      </section>
      <section anchor="networks-require-high-resource-utilization-efficiency">
        <name>Networks Require High Resource Utilization Efficiency</name>
        <t>Traditionally, the usage and allocation of network resources, especially bandwidth, can be supported by a Network Management System (NMS) operation such as path pre-establishment. However, this may not provide efficient usage of network resources. The established paths may reserve the resources for a long time. During this period, the resources cannot be used by other services even when they are not used for transporting any service.</t>
        <t>Using SR-policy-based TE path in networks also facing this problem. Some flows just last for a short period of time, but the TE paths resources for the flows are usually reserved for a long time and cannot be used by other services.</t>
        <t>In this scenario, the controller (originator of the SR policy) can calculate a path with schedule time information based on the flow duration. When the TE path is invalid, the ingress node does not steer any packets to the path and releases the resources. The released resources then can be used by other flows , which can effectively improve the utilization of network resources.</t>
      </section>
    </section>
    <section anchor="schedule-time-information-in-sr-policy">
      <name>Schedule Time Information in SR Policy</name>
      <t>The NLRI defined in <xref target="RFC9830"/> contains the SR Policy candidate path. The content of the SR Policy Candidate Path is encoded in the Tunnel Encapsulation Attribute defined in <xref target="RFC9012"/> using the Tunnel-Type called SR Policy Type with codepoint 15. The SR Policy encoding structure is as follows:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>A candidate path includes multiple SR paths, each of which is specified by a segment list. The schedule time information can be applied to a candidate path, indicating the valid time for each candidate path and its associated attributes.
The new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Schedule Time Information
                Segment List
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>The schedule time information also can be applied to a segment list to indicate the valid time for a segment list and its associated attributes.
The new SR Policy encoding structure is expressed as below:</t>
      <artwork><![CDATA[
SR Policy SAFI NLRI: <Distinguisher, Policy-Color, Endpoint>
      Attributes:
         Tunnel Encapsulation Attribute (23)
            Tunnel Type: SR Policy (15)
                Binding SID
                SRv6 Binding SID
                Preference
                Priority
                Policy Name
                Policy Candidate Path Name
                Explicit NULL Label Policy (ENLP)
                Segment List
                    Schedule Time Information
                    Weight
                    Segment
                    Segment
                    ...
                ...
]]></artwork>
      <t>The Schedule Time Information TLV is either encapsulated at the candidate path level or at the segment list level. It <bcp14>SHOULD NOT</bcp14> be encapsulated at both levels simultaneously.</t>
    </section>
    <section anchor="schedule-time-information-sub-tlv">
      <name>Schedule Time Information Sub-TLV</name>
      <t>The Schedule Time Information sub-TLV defined in this document is used in the SR policy Tunnel TLV, it may be extened to
other type of Tunnel TLVs, but it is out of scope of this document. The Schedule Time Information sub-TLV indicates one
or more valid time slot for one or more paths. It is <bcp14>OPTIONAL</bcp14> and <bcp14>MAY</bcp14> appear more than once in the SR Policy encoding.</t>
      <t>The format of schedule time information sub-TLV is shown as follows:</t>
      <figure anchor="ref-to-fig1">
        <name>Scheduling Time Information Sub-TL</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |Schedule Number|    Reserved   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                        Schedules                              /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>Type: TBD1</t>
      <t>Length: the size of the value field in octets.</t>
      <t>Schedule Number: indicates the number of schedules.</t>
      <t>Schedules: one or more schedules, each schedule indicates the duration when the candidate path (segment list) is active. The format of each schedule is shown as follows:</t>
      <figure anchor="ref-to-fig2">
        <name>Format of Schedules</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           Schedule-id                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Flags  |S|P|R|    Length     |          Reserved             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Start Time                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Start Time(Continue)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       End Time/Duration                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  End Time/Duration(Continue)                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Recurrence count/Bound(Optional)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Recurrence count/Bound(Optional)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Frequency (Optional)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork>
      </figure>
      <t>Schedule-id: 32-bit value, the unique identifier to distinguish each schedule within a SR Policy, this value is allocated by the SR Policy generator.</t>
      <t>Flags: 8 bits, currently only 2 bits are used, the other bits are reserved.</t>
      <t>Length: 8 bits, indicates the length of this schedule in octets.</t>
      <t>S (Schedule type): one-bit flag to indicate the type of a schedule. If S=0, it indicates the schedule only has one instance, the Recurrence Count/Bound, Frequency and Interval field should not be included in the sub-TLV; If S=1, it indicates the schedule has multiple instances, the Recurrence Count/Bound, Frequency and Interval field should be included.</t>
      <t>P (Period type): one-bit flag to indicate the description type of a period. if P=1, then the period is described by a start time filed and an end time field; If P =0, then the period is described by a start time field and a duration time field.</t>
      <t>R (Recurrence bound type): one-bit flag to indicate the how to determine whether the recurrence is end. if R=1, then the end of recurrence is determined by a detail timepoint; If R = 0, then the end of the recurrence is determined by the number of occurrences.</t>
      <t>Start Time: 64-bit value, the number of seconds since the epoch, it indicates when the candidate path (segment list) and its associated attributes start to take effect. The epoch is 1 January 1970 at 00:00 UTC.</t>
      <t>End Time (Duration): 64-bit value, if the flag P=1, then it is the number of seconds since the epoch, it indicates when the candidate path (segment list) and its associated attributes becomes ineffective. If the flag P=0, then it is the number of seconds since the Start Time, it indicates how long the candidate path (segment list) and its associated attributes are effective.</t>
      <t>Recurrence Count/Bound(optional): 64-bit value, this field <bcp14>SHOULD</bcp14> be included when the flag P is set to 1. When the flag R=0, then this field indicates the max number of occurrences. For example, if it is set to 2, then the schedule will repeat twice with the specified Frequency and Interval. When the flag R=1, then tis field indicates the bounded timepoint of recurrence, it is descripted by the number of seconds since the epoch.</t>
      <t>Frequency(optional): 32-bit value, this field should be included when the flag S is set to 1. It is the numbers of seconds since the Start Time of an instance to the Start Time of next instance. This field indicates the recurrence frequency for all the instance of this schedule.</t>
    </section>
    <section anchor="operations">
      <name>Operations</name>
      <section anchor="advertisement-of-sr-policies-with-schedule-time-information">
        <name>Advertisement of SR Policies with Schedule Time Information</name>
        <t>As described in <xref section="4.1" sectionFormat="of" target="I-D.ietf-idr-sr-policy-safi"/>, typically, an SR Policy is computed by a controller or a path computation engine (PCE) and originated by a BGP speaker on its behalf. The schedule time information is also computed by a controller or a PCE which can access to all the predicted topology changes. The predicted topology changes could be got from management interfaces or other means.</t>
        <t>The controller or PCE <bcp14>SHOULD</bcp14> maintain a time-variant event database as described in <xref section="6" sectionFormat="of" target="I-D.zdm-tvr-applicability"/> to store all the predicted information, and compute SR Policies with schedule time information based on the database.</t>
        <t>Each Candidate Path or Segment List may have multiple schedules, each schedule is identified by schedule-id, the controller or PCE <bcp14>MUST</bcp14> make the schedule-id unique within a specific SR Policy.</t>
        <t>if no schedule is included in the Schedule Time Information sub-TLV, then it is assumed that the candidate path or segment list is not time-varing.</t>
      </section>
      <section anchor="reception-of-an-sr-policy-with-schedule-time-information">
        <name>Reception of an SR Policy with Schedule Time Information</name>
        <t>As described in <xref target="I-D.ietf-idr-sr-policy-safi"/>, the BGP SR Policy is distinguished by &lt;distinguisher, color, endpoint&gt; tuple. Whenever a headend receives a SR Policy that it has received before, the SR Policy is considered as the fully replacement of the old one.</t>
        <t>The headend <bcp14>MUST NOT</bcp14> use the SR Policy with schedule time information when it does not have the capability to deal with the schedule time information.</t>
        <section anchor="validation">
          <name>Validation of Schedule Time Information</name>
          <t>On reception of an SR Policy, a BGP speaker first determines if it is valid as described in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-idr-sr-policy-safi"/>.
When a headend receives a SR Policy with Schedule Time Information from it neighbors or controller, it <bcp14>SHOULD</bcp14> perform
schedule time information validation based on the following rules:</t>
          <ul spacing="normal">
            <li>
              <t>When multiple schedules are present within one SR Policy, the schedule-id of each schedules <bcp14>MUST</bcp14> be different. If there
are multiple schedules with the same schedule-id, then the first instance of that schedule is used, and the other instances <bcp14>MUST</bcp14> be ignored.</t>
            </li>
            <li>
              <t>If a SR Policy encapsulates Schedule Time Information sub-TLVs at both candidate path level and segment list level simultaneously,
then the sub-TLVs at segment list level is used, and the sub-TLVs at candidate path level <bcp14>MUST</bcp14> be ignored.</t>
            </li>
            <li>
              <t>The Start Time of Schedule Time Information sub-TLV <bcp14>MUST</bcp14> be later than the time it be received, if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
            <li>
              <t>If the End Time/Duration field is used to indicated the end time, then it <bcp14>MUST</bcp14> be later than the Start Time, if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
            <li>
              <t>If the Frequency field is present in the Schedule Time Information sub-TLV, then it <bcp14>MUST</bcp14> be greater than the difference between the End Time and Start Time(P=1), or greater than the Duration(P=0), if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
            <li>
              <t>If the Recurrence Count/Bound field is present and used to indicate the boundary time point, then it <bcp14>MUST</bcp14> be greater than the End Time(P=1), or greater than the sum of Start Time and Duration(P=0), if not, the sub-TLV <bcp14>MUST</bcp14> be considered as malformed.</t>
            </li>
          </ul>
        </section>
        <section anchor="enabledisable-candidate-pathssegment-lists">
          <name>Enable/Disable Candidate Paths/Segment Lists</name>
          <t>When a headend receives a SR Policy with schedule time information, it <bcp14>SHOULD</bcp14> parse the SR Policy and save the schedule time information locally. When a data packet arrives, it will steer it to a specific SR Policy by color or other means.</t>
          <t>Within a specific SR Policy, the headend dynamically enable/desable different Candidate Paths/Segment Lists based on the schedule time information.</t>
        </section>
      </section>
    </section>
    <section anchor="error-handling-and-fault-management">
      <name>Error Handling and Fault Management</name>
      <t>The error handling actions defined in <xref section="5" sectionFormat="of" target="I-D.ietf-idr-sr-policy-safi"/> are also applicable in this document.</t>
      <t>If a BGP speaker receives a SR Policy with Schedule Time Information but it does not have the capability to deal with the
schedule time information, then the SR Policy <bcp14>SHOULD NOT</bcp14> be considered usable as described in {Section 4.2.2 of !!I-D.ietf-idr-sr-policy-safi}.</t>
      <t>The validation rules defined in <xref target="validation"/> also <bcp14>SHOULD</bcp14> be performed by SRPM to determine if the Schedule Time Information sub-TLV is malformed or invalid.
If the Schedule Time Information sub-TLV is invalid or malformed, then the implementation <bcp14>SHOULD</bcp14> log errors, and the corresponding
SR Policy <bcp14>MUST NOT</bcp14> be used and <bcp14>MUST</bcp14> be handled by the "treat-as-withdraw" strategy.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>The specification of BGP models is an ongoing work based on <xref target="I-D.ietf-idr-bgp-model"/> and its future extensions are expected
to cover the SR Policy SAFI and its extensions. Existing BGP operational procedures also apply to the extension specified
in this document.</t>
      <t>The YANG model for the operation and management of SR Policies with Schedule Time Information will be defined in the future.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described in the <xref target="I-D.ietf-idr-sr-policy-safi"/> apply to the extensions described in this document as well.</t>
      <t>The Schedule Time Information TLV defined in this document could provide details about the network operations thant could be sensitive.
Attacker can obtain these sensitive data by snooping BGP messages and select the optimal attack time. Thus suitalbe BGP security mechanisms like
TLS is necessary.</t>
      <t>Time sychronization is essential for schedules, the attackers can attack the network by generating incorrect time synchronization messages
or block the time synchronization process. Therefore, redundant time synchronization mechanisms and secure time synchronization
mechanisms(such as NTS (Network Time Security)) are also necessary.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines a sub-TLV in the registry "BGP Tunnel Encapsulation Attribute sub-TLVs" to be assigned by IANA:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">Schedule Time Information (STI)</td>
            <td align="left">This document</td>
          </tr>
        </tbody>
      </table>
      <t>The type value of this sub-TLV is recommended to be token from the range of 64-125(First Come First Served).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tvr-requirements" target="https://datatracker.ietf.org/doc/html/draft-ietf-tvr-requirements-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tvr-requirements.xml">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>Time-Variant Routing (TVR) refers to calculating a path or subpath through a network where the time of message transmission (or receipt) is part of the overall route computation. This means that, all things being equal, a TVR computation might produce different results depending on the time that the computation is performed without other detectable changes to the network topology or other cost functions associated with the route. This document introduces requirements where TVR computations could improve message exchange in a network.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-07"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="I-D.ietf-idr-sr-policy-safi" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-sr-policy-safi-13" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-sr-policy-safi.xml">
          <front>
            <title>Advertising Segment Routing Policies in BGP</title>
            <author fullname="Stefano Previdi" initials="S." surname="Previdi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Paul Mattes" initials="P." surname="Mattes">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dhanendra Jain" initials="D." surname="Jain">
              <organization>Google</organization>
            </author>
            <date day="6" month="February" year="2025"/>
            <abstract>
              <t>A Segment Routing (SR) Policy is an ordered list of segments (also referred to as instructions) that define a source-routed policy. An SR Policy consists of one or more candidate paths, each comprising one or more segment lists. A headend can be provisioned with these candidate paths using various mechanisms, such as CLI, NETCONF, PCEP, or BGP. This document specifies how BGP can be used to distribute SR Policy candidate paths. It introduces a BGP SAFI for advertising a candidate path of an SR Policy and defines sub-TLVs for the Tunnel Encapsulation Attribute to signal information related to these candidate paths. Furthermore, this document updates RFC9012 by extending the Color Extended Community to support additional steering modes over SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-sr-policy-safi-13"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9830" target="https://www.rfc-editor.org/info/rfc9830" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9830.xml">
          <front>
            <title>Advertising Segment Routing Policies in BGP</title>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <author fullname="D. Jain" initials="D." surname="Jain"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>A Segment Routing (SR) Policy is an ordered list of segments (also referred to as "instructions") that define a source-routed policy. An SR Policy consists of one or more Candidate Paths (CPs), each comprising one or more segment lists. A headend can be provisioned with these CPs using various mechanisms such as Command-Line Interface (CLI), Network Configuration Protocol (NETCONF), Path Computation Element Communication Protocol (PCEP), or BGP.</t>
              <t>This document specifies how BGP can be used to distribute SR Policy CPs. It introduces a BGP SAFI for advertising a CP of an SR Policy and defines sub-TLVs for the Tunnel Encapsulation Attribute to signal information related to these CPs.</t>
              <t>Furthermore, this document updates RFC 9012 by extending the Color Extended Community to support additional steering modes over SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9830"/>
          <seriesInfo name="DOI" value="10.17487/RFC9830"/>
        </reference>
        <reference anchor="I-D.zdm-tvr-applicability" target="https://datatracker.ietf.org/doc/html/draft-zdm-tvr-applicability-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.zdm-tvr-applicability.xml">
          <front>
            <title>Applicability of TVR YANG Data Models</title>
            <author fullname="Li Zhang"/>
            <author fullname="Jie Dong"/>
            <author fullname="Mohamed Boucadair"/>
            <date day="16" month="October" year="2025"/>
            <abstract>
              <t>Time-Variant Routing (TVR) is a routing system that can support the
   predicted topology changes caused by internal or external reasons.
   Typical use cases include resource preservation networks, operating
   efficiency networks and dynamic reachability networks.  This document
   provides examples of how to implement the TVR scheduling capabilities
   for key use cases.  It describes which part of the TVR data model is
   used and why, and it outlines operational and security considerations
   when deploying TVR-based technologies.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9657" target="https://www.rfc-editor.org/info/rfc9657" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9657.xml">
          <front>
            <title>Time-Variant Routing (TVR) Use Cases</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="N. Kuhn" initials="N." surname="Kuhn"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document introduces use cases where Time-Variant Routing (TVR) computations (i.e., routing computations that take into consideration time-based or scheduled changes to a network) could improve routing protocol convergence and/or network performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9657"/>
          <seriesInfo name="DOI" value="10.17487/RFC9657"/>
        </reference>
        <reference anchor="RFC8934" target="https://www.rfc-editor.org/info/rfc8934" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8934.xml">
          <front>
            <title>PCE Communication Protocol (PCEP) Extensions for Label Switched Path (LSP) Scheduling with Stateful PCE</title>
            <author fullname="H. Chen" initials="H." role="editor" surname="Chen"/>
            <author fullname="Y. Zhuang" initials="Y." role="editor" surname="Zhuang"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines a set of extensions to the stateful PCE Communication Protocol (PCEP) to enable Label Switched Path (LSP) path computation, activation, setup, and deletion based on scheduled time intervals for the LSP and the actual network resource usage in a centralized network environment, as stated in RFC 8413.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8934"/>
          <seriesInfo name="DOI" value="10.17487/RFC8934"/>
        </reference>
        <reference anchor="RFC9012" target="https://www.rfc-editor.org/info/rfc9012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9012.xml">
          <front>
            <title>The BGP Tunnel Encapsulation Attribute</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
              <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9012"/>
          <seriesInfo name="DOI" value="10.17487/RFC9012"/>
        </reference>
        <reference anchor="I-D.ietf-idr-bgp-model" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-bgp-model-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-bgp-model.xml">
          <front>
            <title>YANG Model for Border Gateway Protocol (BGP-4)</title>
            <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
              <organization>Kloud Services</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Susan Hares" initials="S." surname="Hares">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>This document defines a YANG data model for configuring and managing BGP, including protocol, policy, and operational aspects, such as RIB, based on data center, carrier, and content provider operational requirements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-model-18"/>
        </reference>
      </references>
    </references>
    <?line 356?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
