<?xml version="1.0" encoding="US-ASCII"?>

<!DOCTYPE rfc> 
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="3"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->

<rfc category="info" docName="draft-song-ippm-postcard-based-telemetry-16" ipr="trust200902">
  <front>
    <title abbrev="OPT-M">On-Path Telemetry using Packet Marking to Trigger Dedicated OAM Packets</title>

    <author fullname="Haoyu Song" initials="H." surname="Song">
      <organization>Futurewei Technologies</organization>
      <address>
        <postal>
          <street>2330 Central Expressway</street>
          <city>Santa Clara, 95050</city>
          <country>USA</country>
        </postal>
        <email>hsong@futurewei.com</email>
      </address>
    </author>

    
	<author fullname="Greg Mirsky" initials="G." surname="Mirsky">
      <organization>Ericsson</organization>
      <address>
             <postal>
          <street></street>
          <city></city>
          <country></country>
        </postal>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>

	<author fullname="Tianran Zhou" initials="T." surname="Zhou">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>156 Beiqing Road</street>
          <city>Beijing, 100095</city>
          <country>P.R. China</country>
        </postal>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>

    <author fullname="Zhenbin Li" initials="Z." surname="Li">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>156 Beiqing Road</street>
          <city>Beijing, 100095</city>
          <country>P.R. China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
	
	<author initials="T." surname="Graf" fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <postal>
          <street></street>
          <country>Switzerland</country>
        </postal>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
	
	<author fullname="Gyan Mishra" initials="G." surname="Mishra">
      <organization>Verizon Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <country></country>
        </postal>
        <email>hayabusagsm@gmail.com</email>
      </address>
    </author>
	
    <author fullname="Jongyoon Shin" initials="J." surname="Shin">
      <organization>SK Telecom</organization>

      <address>
        <postal>
          <street></street>

          <city></city>

          <country>South Korea</country>
        </postal>

        <email>jongyoon.shin@sk.com</email>
      </address>
    </author>


    <author fullname="Kyungtae Lee" initials="K." surname="Lee">
      <organization>LG U+</organization>

      <address>
        <postal>
          <street></street>

          <city></city>

          <country>South Korea</country>
        </postal>

        <email>coolee@lguplus.co.kr</email>
      </address>
    </author>


    <date day="30" month="May" year="2023"/>
	 
    <area>Transport Area</area>
    <workgroup>IPPM</workgroup>

    <abstract>
      <t>
	 The document describes an on-path telemetry method using packet-marking, referred to as PBT-M. 
     Similar to IOAM DEX, PBT-M does not carry the telemetry data in user packets but sends the telemetry data through a dedicated packet. 
	 However, PBT-M does not require an extra instruction header but claims a bit in existing header fields or uses some other equivalent 
	 means as a trigger for telemetry data processing and collection. 
	 Due to this feature, PBT-M raises some unique issues that need to be considered for its application in different networks.	 
     This document describes the high level scheme, summarizes the common requirements and issues, and provides recommendations for solutions.  
	 PBT-M is complementary to the other on-path telemetry schemes.      
      </t>
    </abstract>
	
	<note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"></xref><xref target="RFC8174"></xref> when, and only when, they appear in all
   capitals, as shown here.</t>
    </note>
  </front>

  <middle>

    <section title="Introduction">
      <t>To gain detailed data plane visibility to support effective network OAM, 
	 it is essential to be able to examine the trace of user packets along their forwarding paths. Such on-path flow data reflect  
	 the state and status of each user packet's real-time experience and provide valuable information 
	 for network monitoring, measurement, and diagnosis. 
      </t>
        
      <t>The telemetry data include but not limited to the detailed forwarding path, the timestamp/latency at each network node, and, in case of
       packet drop, the drop location and reason. 
	 The emerging programmable data plane devices allow user-defined data collection
	 or conditional data collection based on trigger events.
	 Such on-path flow data are from and about the live user traffic, which 
	 complements the data acquired through other passive and active OAM mechanisms such as 
	 <xref target="RFC7011">IPFIX</xref> and <xref target="RFC4560">ICMP</xref>. 
      </t>
		
	  <t> This document describes PBT-M, a new on-path telemetry technique which complements <xref target="RFC9197">IOAM Trace</xref> and <xref target="RFC9326">IOAM DEX</xref>. 
      PBT-M does not require a telemetry instruction header but a trigger bit in some existing header fields or some equivalent means. 
      Due to this feature, the seemingly simple scheme raises some unique issues that need to be considered for successful application. 	 
      This document serves as a central location to archive the challenges 
	  common to PBT-M and provides solution recommendations, aiming to eliminate duplicated efforts when applying PBT-M in different network scenarios. </t>  
            
      
    </section>

    <section title="PBT-M">

      <t>As the name suggests, PBT-M only needs a marking-bit in the existing headers of user packets (or some equivalent means) to trigger the telemetry data collection and export. 
          The sketch of PBT-M is as follows. 
		  If some on-path data need to be collected for a user packet, the user packet is marked at the path head node.   
          At each PBT-M-aware node on the path, if the mark is detected, a telemetry data packet (i.e., the dedicated OAM packet triggered by the marked user packet) is generated and sent to a collector. Meanwhile, the original user packet is forwarded without delay and alteration.  
	  The telemetry data packet contains the data requested by the management plane. 
	  The requested data are configured by the management plane.   
	  Once the collector receives the postcards for a single user packet from different path nodes, 
	  it can infer the packet's forwarding path and analyze the data set. 
	  The path end node is configured to un-mark the packets to its original format if necessary. 
	</t><t>
          The overall architecture of PBT-M is depicted in Figure 1. 

	</t><t>
        
	<figure title="PBT-M Architecture" anchor="figure_1">
          <artwork>

                      +------------+        +-----------+ 
                      | Network    |        | Telemetry | 
                      | Management |(-------| Data      | 
                      |            |        | Collector | 
                      +-----:------+        +-----------+ 
                            :                     ^ 
                            :configurations       |telemetry data 
                            :                     |(OAM pkts) 
             ...............:.....................|........
             :             :               :      |       :
             :   +---------:---+-----------:---+--+-------:---+
             :   |         :   |           :   |          :   |
             V   |         V   |           V   |          V   |
          +------+-+     +-----+--+     +------+-+     +------+-+
usr pkts  | Head   |     | Path   |     | Path   |     | Tail   |
     ====>| Node   |====>| Node   |==~=>| Node   |====>| Node   |===>
          |        |     | X      |     | Y      |     |        |
          +--------+     +--------+     +--------+     +--------+
        mark usr pkts   gen OAM pkts   gen OAM pkts   gen OAM pkts
        gen OAM pkts                                  unmark usr pkts  

          </artwork>
         </figure>

	</t>
          
      <t>    
        The advantages of PBT-M are summarized as follows.  
      </t>	      

        <t>
          <list style="symbols">
            <t>
              1: PBT-M avoids the need to augment user packets with new headers while 
	             the signaling for telemetry data collection remains in the data plane. 
	    </t><t>
              2: PBT-M is extensible for collecting arbitrary new data types to support possible future use cases. 
	      The data set to be collected can be configured through the management plane or control plane. 
	    </t><t>
              3: PBT-M is not intrusive to the normal forwarding of user traffic. 
	      The collected data are free to be transported independently through in-band or out-of-band channels. 
	      The data collecting, processing, assembly, encapsulation, and transport are, therefore, decoupled 
	      from the forwarding of the corresponding user packets and can even be performed in data-plane slow-path if necessary. 
	    </t><t>
              4: For PBT-M, through customized configuration, the types of data collected from each node can vary depending on application requirements and node capability, increasing the application efficiency and flexibility. 
	    </t><t>
              5: PBT-M makes it easy to secure the collected data without exposing it to unnecessary entities. 
	      For example, both the configuration and the telemetry data can be encrypted and/or authenticated before being transported,
	      so passive eavesdropping and a man-in-the-middle attack can both be deterred.
	    </t><t>
	          6: Even if a user packet under inspection is dropped at some node in the network, 
	      the incomplete set of OAM packets collected from the preceding nodes are still valid and can be used to 
	      diagnose the packet drop location and reason.
            </t>
			<t>7: Since the OAM packets are generated and exported separately, raw data can be processed or aggregated in data plane to reduce the exporting traffic load and post-processing burden.
			</t>
         </list>
        </t>
        
      </section>

      <section anchor="challenge" title="Requirements and Challenges">
	   <t>
          Although PBT-M is simple and has many advantages, it also introduces a few new requirements and challenges due to its unique feature.  
        </t><t>
	  <list style="hanging">
            <t hangText="OAM Packet Trigger:"> A user packet needs to be marked to trigger the on-path data collection. 
			  Since PBT-M aims to avoid the need to augment user packets with new headers, 
	          it needs to reserve or reuse a single bit from the existing header fields, or engage with some other equivalent means.
			  This raises a similar issue as in <xref target="RFC9341">the Alternate Marking Scheme</xref>
            </t>
			<t hangText="Data Plane Configuration:"> Since the packet header will not carry explicit telemetry instructions anymore, 
	          the data plane needs to be configured to know where and what data to collect. 
	          However, in general, the forwarding path of a flow packet (due to ECMP or dynamic routing) is unknown beforehand (note that there are some
              notable exceptions, such as segment routing). If the per-flow customized data collection is desired, 
	          configuring the data set for each flow at all data plane devices can be expensive in terms of configuration load and data plane resources.
	        </t>
			<t hangText="Data Export:"> A standard and extensible OAM packet encoding and export protocol is needed, applicable to any        application scenarios and in any networks. This can also simplify the data consumption and post processing. 
			</t>
			<t hangText="Data Correlation:"> Due to the variable transport latency, the dedicated OAM packets for a single packet may arrive at the collector 
	          out of order or be dropped in networks for some reason. In order to infer the packet forwarding path, 
	          the collector needs some information from the OAM packets to identify the user packet affiliation and the order of path node traversal. Data correlation is especially challenging for PBT-M due to the lack of facilitating metadata.   
            </t>
            <t hangText="Security:"> Last but not the least, security issues need to be considered for PBT-M. PBT-M makes it easier to trigger data collection and more nodes participate in data exporting, so a potential attack is easier to launch and more vulnerable points are involved for PBT-M than for the other OPT techniques. 
			For example, since each OAM packet has its header, the overall network bandwidth overhead of PBT-M is higher. 
			A large number of OAM packets could add data collecting pressure on network devices and data processing pressure on data collecting servers, leading to performance concerns and a potential attack vector for DoS. While many measures can be taken to optimize the performance, we defer the further security considerations in <xref target="security"/>. 
			</t> 			
          </list>
        </t>  
      </section>

    <section title="Design Considerations and Recommendations">
        <t>      
          To address the above requirements and challenges, we propose the considerations and recommendations for implementing and applying PBT-M.
        </t>	      
	  <section title ="Packet Marking">
          <t>
            To trigger the path-associated data collection, in most cases, a single bit from some existing header field is sufficient. 
	    While no such bit is available, other packet-marking techniques can be needed. 
	    We discuss several possible application scenarios.
	    </t><t>
	    <list style="symbols">
              <t>
		IPv4. <xref target="RFC9341">Alternate Marking (AM)</xref> is an IP flow performance measurement 
		framework that also requires a single bit for packet coloring. 
		The difference is that AM conducts in-network measurements such as latency and packet loss rate based on the bit alternating patterns while PBT-M only collects and exports data at each network nodes when the trigger bit is set. AM suggests to use some reserved bit of the Flag field or 
		some unused bit of the TOS field. PBT-M can share the same bit with AM, and rely on   
		the management plane to configure the actual operation mode.
              </t><t>	
	        SFC NSH. The OAM bit in the NSH header can be used to trigger the on-path data collection <xref target="RFC8300"></xref>. 
	        PBT-M does not add any other metadata to NSH.
	      </t><t>
	        MPLS. Instead of choosing a header bit, we take advantage of <xref target="I-D.bryant-mpls-synonymous-flow-labels"> 
		the synonymous flow label </xref> approach to mark the packets. A synonymous flow label indicates 
		the on-path data should be collected and 
		forwarded through a postcard. The ongoing MPLS Network Action (MNA) work <xref target="I-D.andersson-mpls-mna-fwk"/> may provide new in-stack headers for MNAs. A bit can be claimed for PBT-M as proposed in <xref target="I-D.song-mpls-flag-based-opt"/>. 
              </t><t>
            SRv6: A flag bit in SRH can be reserved to trigger the on-path data collection <xref target="I-D.song-6man-srv6-pbt"/>. <xref target= "RFC9259">SRv6 OAM</xref> has adopted the O-bit in SRH flags as the marking bit to trigger the telemetry.  
            </t>
            </list>
          </t>
		  <t> The marking method for other protocols (e.g., IPv6) is subject to further study and is out of scope of this document. </t>
        </section>	  
	  <section title ="Flow Path Discovery">
          <t>
            In case the path that a flow traverses is unknown in advance, all PBT-M-aware nodes in an application domain should by default be configured to react to the marked packets by 
            exporting some basic data, such as node ID and TTL before a data set template for that flow is configured. 
	    This way, the management plane can learn the flow path dynamically from the postcard packets and delay the decision on collecting more comprehensive data by configuring only the relevant nodes.  
          </t><t>	
            If the management plane wants to collect the on-path data for some flow, in order to reduce the data redundancy, workload for network devices and data collectors, and network bandwidth consumption, it is unnecessary to mark every flow packet. Instead,  
	    it is recommended to configure the head node(s) with a sampling probability or time interval for the flow packet marking. 
	    When the first marked packet is forwarded in the network, the PBT-M-aware nodes will export the basic data set to the collector. 
	    Hence, the flow path is identified. If other data types need to be collected, 
	    the management plane can further configure the data set's template to the target nodes on the flow's path. 
	    The PBT-M-aware nodes collect and export data accordingly if the packet is marked and a data set template is present. 
          </t><t>	
	    If the flow path is changed for any reason, the new path can be quickly learned 
	    by the collector. Consequently, the management plane controller can be directed 
	    to configure the nodes on the new path. The outdated configuration can be automatically timed out or 
	    explicitly revoked by the management plane controller.
          </t>	
        </section>	  
	  <section anchor="correlation" title ="Packet Identity for OAM Packet Correlation">
          <t>For a marked user packet, each PBT-M-aware node will send an independent OAM packet. 
            The collector needs to correlate all the OAM packets corresponding to the user packet. 
	    Once this is done, the TTL (or the timestamp, if the network time is synchronized) 
	    can be used to infer the flow forwarding path. Due to the lack of some explicit identifiers as in IOAM DEX, 
		the OAM packet correlation needs to take different measures.
          </t><t>	
	    The first possible approach is to require that the exported data in the OAM packets must include the flow ID plus the user packet ID extracted for the marked user packet.
            For example, the flow ID can be the 5-tuple IP header of the user traffic, and
	    the user packet ID can be some unique information pertaining to a user packet (e.g., the sequence number of a TCP packet).
		Alternatively, a hashing digest of the invariant part of the packet during the forwarding (e.g., excluding the TTL and checksum fields of an IPv4 header) can serve as both the flow ID and the packet ID. The possibility of hash collision is negligible since the set of correlated OAM packets can only appear in a very short time frame. 
          </t><t>	
        If the packet marking interval is made large enough, the flow ID alone is enough to identify a user packet. 
	    As a result, it can be safely assumed that all the exported OAM packets for the same flow during a short time interval belong to the same user packet.
          </t><t>	
        The second approach requires the network to be synchronized. In this case, the flow ID plus the timestamp at each node can also infer the OAM packet affiliation. For the OAM packets from the same flow, the collector only needs to sort them based on the timestamp. 
	    However, some errors may occur under some circumstances. For example, 
	    two consecutive user packets from the same flows are marked, but one exported OAM packet from a node is lost. 
	    It is difficult for the collector to decide to which user packet the remaining OAM packet is related. 
	    In many cases, such a rare error has no catastrophic consequence. Therefore it is tolerable. Again, a larger sampling gap can mitigate this problem.   
          </t>	
      </section>	  
    
      <section title ="Load Control">
	  
		   <t>PBT-M should not be applied to all the packets all the time. It is better to be used in an interactive environment where the 
		   network telemetry applications dynamically decide which subset of traffic is under scrutiny. The network devices can limit the packet marking rate
           through sampling and metering. The OAM packets can be distributed to different servers to balance the processing load. </t>	

           <t>Because PBT-M sends telemetry data by dedicated OAM packets, it allows data aggregation and compression. Each node can process the generated raw data according to the configured local data-export policies. Such policies may specify how raw data is used to calculate performance metrics, e.g., max, min, mean, percentile, etc. 
           </t> 		   
	  
	       <t>It is also possible to customize the data collection on each node to reduce the data exporting load. For example, if only end-to-end latency rather than the per-hop delay is of interest to the application, then only the head and tail nodes need to be configured to export the timestamps while the other on-path nodes are just configured to collect the other routine data.</t>  
		   
		   <t>Combining the above recommendations, PBT-M can be made flexible and efficient. </t>
	  
	  </section>
      
	  
	  <section title="Incremental Deployment">
	  
	      <t>Given that even an incomplete set of OAM packets for a user packet are useful for network monitoring and measurement, PBT-M is ideal for incremental deployment. A node which is node updated to support PBT-M SHOULD ignore the trigger and continue to forward any marked packet normally. </t>
		  
		  <t>It is also possible for a node to not export certain data items for various reasons (e.g., node busy or data unavailable). </t> 
	  </section>
  	    
	
	  <section title="Node Configuration">
        <t>Access lists with an optional sampler, <xref target="RFC5476"/>,
        should be configured and attached at the ingress of the PBT-M
        encapsulation node's to select the intended flows for PTB-M.
		A flow packet sampling policy meeting the application requirement should also be configured.</t>

		<t>A telemetry data template pertaining to a flow or a node should be configured to define the type and format of the data to be collected. </t> 

        <t>The OAM packet format should also be configured. Particularly, the flow data should be exported at each
         participating node using IPFIX <xref
        target="RFC7011"/>.</t>
      </section>

      <section title="Data Export">
        <t>The data decomposition can be achieved on the PBT-M-aware node exporting
        the data or on the IPFIX data collection. <xref
        target="I-D.spiegel-ippm-ioam-rawexport"/> describes how data is being
        exported when decomposed at IPFIX data collection. When being
        decomposed on the PBT-M-aware node the data can be aggregated according to
        section 5 of <xref target="RFC7015"/>. The following IPFIX entities
        are of interest to describe the relationship to the forwarding
        topology and the control-plane.</t>

        <t><list style="symbols">
            <t>node id and egressInterface(IE14) describes on which node which
            logical egress interfaces have been used to forward the
            packet.</t>

            <t>Node id and egressPhysicalInterface(253) describes on which
            node which physical egress interfaces have been used to forward
            the packet.</t>

            <t>Node id and ipNextHopIPv4Address(IE15) or
            ipNextHopIPv6Address(IE62), describes the forwarding path to which
            next-hop IP address.</t>

            <t>Node id and mplsTopLabelIPv4Address(IE47) or
            srhActiveSegmentIPv6 from <xref
            target="I-D.tgraf-opsawg-ipfix-srv6-srh"/> describes the
            forwarding path to which MPLS top label IPv4 address or SRv6
            active segment.</t>

            <t>BGP communities are often used for setting a path priority or
            service selection. bgpDestinationExtendedCommunityList(488) or
            bgpDestinationCommunityList(485) or
            bgpDestinationLargeCommunityList(491) describes which group of
            prefixes have been used to forward the packet.</t>

            <t>Node id and destinationIPv4Address(13),
            destinationTransportPort(11), protocolIdentifier (4) and
            sourceIPv4Address(IE8) describes the forwarding path on each node
            from each IPv4 source address to a specific application in the
            network.</t>

            <t>In order to distinguish wherever the packet has been export due
            to the packet marking or not, in case of SRv6, srhFlagsIPv6
            as described in section 4.1 of <xref
            target="I-D.tgraf-opsawg-ipfix-srv6-srh"/> can be added to the
            data export.</t>
          </list></t>
      </section>
	  
  </section>
  
	  <section title="Use Cases">
	   
		  <t>PBT-M has been used for <xref target= "RFC9259">SRv6 OAM</xref>. Currently, the MPLS Open Design Team is investigating network action support on the MPLS data plane <xref target="I-D.andersson-mpls-mna-fwk"/>.
		  The challenge has been to continue to support existing MPLS architecture, backwards compatibility as well as not excessively increase the depth 
		  of the MPLS label stack with a variety of functional special purpose labels and network action indicators similar in concept to the MPLS Entropy label ELI, EL added to the 
		  label stack, as well as the MPLS extension headers being in stack or post stack.</t>
		  
		  <t>Reference Augmented Forwarding (RAF) <xref target="I-D.raszuk-mpls-raf-fwk"></xref> utilizes In Stack Data (ISD) with parity to Entropy Label stack {TL,RFI,RFV,AL} 
		  and control plane extension to distribute special network actions and forwarding behaviors.</t> 
				 
		  <t>The MPLS Design Team may come up with other alternatives to carry network actions and PBT-M can be supported as a use case.</t> 
        		
		  <t>With Segment Routing SR-MPLS and SRv6 as Maximum SID Depth(MSD) as well as PMTU in SR Policy are critical issues for SR path instantiation by a controller, PBT-M can become
		  a critical solution to ensure that OPT can be viable for operators by eliminating telemetry data from being carried in-situ in the SR-TE policy path.</t>
		  		   
		  <t>This draft provides a critical optimization that fills the gaps with IOAM DEX related to packet marking triggers using existing mechanisms as well 
		  as flow path discovery mechanisms to avoid data plane complexity and helps mitigate SR MSD and PMTU issues.</t>  	
	  
	  </section>


    <section anchor="security" title="Security Considerations">
	    <t> Several security issues need to be considered. </t>

	    <t>
      <list style="symbols">
	    <t>      
          Eavesdrop and tamper: the OAM packets can be encrypted and authenticated to avoid such security threats. Since the telemetry data are not required to be attached to the user packet in real time, PBT-M has more time and freedom to process the collected data. If necessary, the device slow-path can be used.		    
        </t><t>
	DoS attack: PBT-M can be limited to a single administrative domain. The mark must be removed at the egress domain edge. The telemetry data can be aggregated and accumulated.  
	The node can rate-limit the extra traffic incurred by OAM packets. In the worst case, the node can ignore the data collecting request from the marked packets.	
        </t>
      </list>
      </t>      
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>
        No requirement for IANA is identified.
      </t>
    </section>

    
    <section anchor="Contributors" title="Contributors">
      <t></t>
    </section>

    <section anchor="Acknowledgments" title="Acknowledgments">
      <t>
        We thank Clarence Filsfils, Ahmed Abdelsalam, Robert Raszuk, Alfred Morton who provided valuable suggestions and comments helping improve this draft.
      </t>
    </section>

  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>
      <?rfc include='reference.RFC.8174'?>
    </references>
	
    <references title="Informative References">
	  <?rfc include="reference.RFC.9341"?>
	  <?rfc include='reference.RFC.7011"?>
	  <?rfc include='reference.RFC.4560"?>
	  <?rfc include='reference.RFC.8300"?>
	  <?rfc include='reference.RFC.9197"?>
	  <?rfc include='reference.RFC.9259"?>
	  <?rfc include='reference.RFC.9326"?>  
	  <?rfc include='reference.I-D.song-6man-srv6-pbt"?>
      <?rfc include='reference.I-D.spiegel-ippm-ioam-rawexport"?>
	  <?rfc include='reference.I-D.bryant-mpls-synonymous-flow-labels"?>
	  <?rfc include='reference.I-D.raszuk-mpls-raf-fwk"?>
	  <?rfc include='reference.RFC.5476"?>
      <?rfc include='reference.RFC.7015"?>
      <?rfc include='reference.I-D.tgraf-opsawg-ipfix-srv6-srh"?>
	  <?rfc include='reference.I-D.andersson-mpls-mna-fwk"?>
	  <?rfc include='reference.I-D.song-mpls-flag-based-opt"?>
	  
    </references>
  </back>
</rfc>

