<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-yang-rtgwg-arn-framework-05" category="std" consensus="true" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="ARN Framework">Application-Responsive Network Framework</title>

    <author initials="F." surname="Yang" fullname="Feng Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>yangfeng@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>

    <date year="2025" month="December" day="26"/>

    <area>RTG</area>
    <workgroup>RTGWG</workgroup>
    

    <abstract>


<?line 42?>

<t>With the deployment of increasingly advanced technologies on a large scale, such as SRv6 and network slicing, there is a growing need to expose these new capabilities to applications. The current practice involves using ACLs to classify packets and then map the traffic onto appropriate network resources. This approach results in the application being passively perceived by the network, rather than the application actively interfacing with the network. Furthermore, changes in application characteristics necessitate triggering network configuration adjustments, making it challenging to deploy at scale.</t>

<t>The document proposes a new framework called Application Responsive Network (ARN), by encapsulating more network functions into ARN ID, thus it opens up interfaces to applications. The vision is to enable applications to access network resources like they access an operating system.</t>



    </abstract>



  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t>With the widespread application of new technologies such as 5G, cloud computing, big data, and AI, network traffic patterns are becoming increasingly complex and diversified. Various emerging services have higher requirements for QoS parameters such as network latency, bandwidth, jitter, and packet loss.</t>

<t>Networks typically need to prioritize critical services. For example, in office networks, video conferencing requires network priority to ensure that video and voice services do not experience buffering and excessive delays. However, the applications used for video and voice services may vary in different industries and office network scenarios, so it is necessary to identify these applications to further ensure the quality of service.</t>

<t>Some specific services have explicit SLA (Service Level Agreement) requirements. In business scenarios such as autonomous driving, industrial control, and remote control, there are clear SLA requirements for the network, such as latency not exceeding 50ms and jitter not exceeding 1ms.</t>

<t>In traditional IP networks, ACLs are typically used on critical network devices to implement application identification and policy configuration. Based on packet characteristics such as the five-tuple, network can provide guaranteed service for specific users or applications. Different network services have their own ACL matching entries and policies, which need to be continuously adjusted as services evolve.  Over time, configurations become invalid due to not being revoked or modified in a timely manner. This is not sufficient for general solution.</t>

<t>This article proposes a new framework called Application Responsive Network (ARN), which abstracts and represents personalized network services based on user demand awareness, provided through ARN Service identifiers (ARN IDs). Network services can be encapsulated by ARN IDs, thus it can be called by user. The vision is to enable applications to access network resources like they access an operating system.</t>

<t>The application here can be network service implemented on a gateway or software that can program the ARN ID.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>ARN: Application-Responsive Networking</t>

<t>ACL: Access Control List</t>

<t>Subscriber: the user who subscribed a network service, which can be represented by an ARN ID</t>

</section>
</section>
<section anchor="gaps"><name>Gaps</name>

<t>There are still the following key gaps in current network technology:</t>

<t>Application-aware features. It is necessary to provide differentiated services based on the different services of the same user. For example, video conferencing needs to avoid stuttering or screen tearing due to congestion and packet loss to ensure a customer experience, while general web browsing services can strive for the best.</t>

<t>Data plane programming capabilities. Identify and classify user application data, and transfer it to the appropriate service-level tunnel based on the results.</t>

<t>Ability to perceive the user experience. Through real-time detection and perception of user-level service experience, it works with intelligent routing to ensure service assurance for high-priority services. Currently, there is a lack of traffic identification for rapid classification and statistical analysis of the user experience of this type of traffic.</t>

<t>Ability to prevent leakage of network services. The security of the access network is relatively poor, and there is a risk of leakage of information related to user applications.</t>

</section>
<section anchor="design-goal"><name>Design Goal</name>

<t>As shown in <xref target="pricipal"/>, an ARN intermediate layer is added between the application and the network, mapping is accomplished using ARN IDs. The ARN ID is a simple number that encapsulates network capabilities internally and hides network information externally, thus avoiding the exposure of application privacy and facilitating user application invocation.</t>

<figure align="center" anchor="pricipal" title="ARN Intermediate Layer Diagram"><artwork type="ascii-art"><![CDATA[
           +---+ 
+-----+    | A |    +-------+
|App  |--->| R |--->|Network|
+-----+    | N |    +-------+
           +---+

]]></artwork></figure>

<t>ARN Network Design Goals:</t>

<t><list style="symbols">
  <t>Opening network services.</t>
</list></t>

<t>One of the design principles of ARN is to open and program network capabilities based on the data plane. By opening programming interfaces on the data plane in a software-based manner, applications can call network resources like calling an operating system. In today's digital world, user demands for the network far exceed simple connectivity functions. Users expect the network to provide stable, high-speed connections to meet diverse application requirements. Even for the same type of application, usage requirements may vary across different industries and scenarios. Allowing applications to call on network capabilities through data plane programming provides corresponding guarantees for different types of packets.</t>

<t><list style="symbols">
  <t>Decoupling of addresses and services.</t>
</list></t>

<t>Another design principle of ARN is to decouple addresses and services. Traditional network design is based on addresses, managing and routing based on destination addresses to determine the forwarding services provided by the network. However, with the increasing variety of user applications, relying on addresses to carry service levels has made network management increasingly complex. Therefore, it is necessary to manage and optimize the network based on the characteristics and requirements of user applications, separating addresses from services to provide multidimensional forwarding services.</t>

<t><list style="symbols">
  <t>Decoupling of network and applications.</t>
</list></t>

<t>The third design principle of ARN is to decouple the network and applications. By adding an ARN layer between the network and applications, the network does not need to directly perceive the applications, thus shielding the diversity of applications and preventing direct access to network capabilities. Through ARN, the network and applications can be encapsulated separately, achieving application privacy and the concealment of internal network information. At the same time, based on this encapsulation, access control can be implemented during the application's network calls, realizing an authorization token-based calling mechanism similar to software programming.</t>

<t><list style="symbols">
  <t>Unified abstraction of network resources.</t>
</list></t>

<t>The fourth design principle of ARN is the unified abstraction of multiple network resources. With the development of personalized and diversified network services, the network resources used in forwarding user packets are becoming increasingly rich, such as computing power, network slicing, service chaining, and more. During the use of these network resources, additional identifiers are often carried in the packets to determine the mapping relationship between users or applications and network resources, or ACLs are used to parse and match the feature information in the packet to determine the associated network resources. In the ARN network, multiple network resources can be uniformly represented by ARN IDs, reducing the complexity of data plane identifiers and simplifying operational deployments.</t>

</section>
<section anchor="arn-framework-and-components"><name>ARN Framework and Components</name>

<t>ARN Framework, as illustrated in <xref target="framework"/>, consists of key components including user edge devices, network edge devices, and network controllers at different levels.</t>

<figure align="center" anchor="framework" title="Framework and Key Components"><artwork type="ascii-art"><![CDATA[
           +--------------------------+
           |       Controller         |
           +-+----------+----------+--+
             |          |          |         
             |SBI       |  SBI     |         
+----+    +--+--+    +--+--+    +--+--+    +-------+
|App |--->|User |--->|     |    |     |    |       | 
+----+    |Edge |    | Net |    | Net |    | Cloud | 
          +-----+    | work|--->| work|--->|       | 
+----+               | Edge|    | Edge|    |Service|
|App |-------------->|     |    |     |    |       |
+----+               +-----+    +-----+    +-------+
           Access         Backbone        

]]></artwork></figure>

<section anchor="arnid"><name>ARN ID</name>

<t>The ARN ID can be generated by the controller based on the user service subscription information and network service information, and the generated ARN ID will be configured to both user edge devices and network edge devices. User service subscription information may include user information, e.g. PPPoE, and application information, e.g. 5 tuple. The network service information can be pre-planed network pathes, e.g. SR policies.</t>

<t>The ARN ID represents the application's invocation of network capabilities and/or the network's ability to be open to the application.</t>

<t>The ARN ID also represents a contractual relationship, and therefore requires lifecycle management of ARN ID, e.g., revocation, loss reporting, replacing, aging, and deferring operations.</t>

<t>A method of allocating ARN ID by PPPoE mechanism is as follows:
Firstly, the user edge device such as BRAS sends the configuration request used to query ARN ID which characterizes a service subscribed by a user. The request includes at least one or more of protocol typr, protocol length, and service id based on the pre-set protocol. The network device connected to the user device receives the request according to the pre-set protocol(e.g. NCP) and allocates the configuration with ARN ID to the user device based on the request. 
According to pre-set service information including service type and identification information of user device, network device determines the service type of user device. Furthermore, it determines ARN ID of the user device based on the said service type information.
Secondly, the user device sends the configuration request with ARN ID to confirm that the ARN ID is correct. The network device receives the message and sends the confirmation message to the user device based on the confirmation request, which is used to characterize whether ARN ID is correct.
When the ARN ID in the configuration request sended from the user device is matching the ARN ID in the congfiguration information sended from the network device, the network device sends the confirmation message characterizing tha accuracy of ARN ID which is allocated to the user device.</t>

</section>
<section anchor="application"><name>Application</name>

<t>User applications require networks to provide differentiated services, especially those based on SR technology. There are two scenarios.</t>

<t>The first scenario is that the user's application supports ARN. By delivering ARN ID to user, user can encapsulate ARN ID for certain application to achieve differentiated services. In this case, the application needs to insert the ARN ID into the extension header of the IPv6 packet.</t>

<t>The second scenario is that the user's application does not support ARN. In this case, network service provider needs to deliver ARN ID to user edge device and map application traffic to the ARN ID to achieve differentiated services.</t>

</section>
<section anchor="user-edge-device"><name>User Edge Device</name>

<t>The user edge devices are responsible for accessing the user applications and are the boundary of the access network. The access network will not be a part of SRv6 or MPLS domains.</t>

<t>The ARN IDs are configured between the user edge device and the network edge device, and the controller only needs to ensure that the ARN ID generated based on different user subscription information and network service information is unique within this range.</t>

<section anchor="arn-id-marking"><name>ARN ID Marking</name>

<t>The user edge device will identify the relevant IP traffic and mark the packet based on the received ARN ID, and then transmits it to network edge device.The ARN ID may be encapsulated into the extension header of the IPv6 packet, which will be explained in detail in <xref target="encapsulation"/>. In this case, an extra IPv6 header is needed.</t>

</section>
</section>
<section anchor="network-edge-device"><name>Network Edge Device</name>

<t>The network edge devices aggregate the traffic from access network, which is the edge of the backbone network. The backbone network runs SRv6 and MPLS.</t>

<t>The network edge device is the boundary of the backbone network, which is the starting point of network service, e.g. tunnels such as SR Policies with various characteristics. Of course, SR Policies are pre-planned by the network operator. The network edge devices will receive both ARN IDs and the mapping of ARN IDs to those pre-planed tunnels from the network controller.</t>

<t>If network edge device is PE, it is desired that VPN services are carried by multiple SRv6 Policies with different color. In this case, the ARN ID in the packet from user can be used to select the appropriate SRv6 Policy.</t>

<section anchor="ingress-processing"><name>Ingress Processing</name>

<t>The processing of ARN occurs on the edge devices at the boundary of the ARN domain. When external packets with ARN ID enter the ARN domain, they will be mapped to SRv6 Policy or slice through the ARN Ingress mapping table. At this point, the ARN ID can be considered as the Color of the data plane, corresponding to the Color of the SRv6 Policy.</t>

</section>
<section anchor="egress-processing"><name>Egress Processing</name>

<t>When packets leave the ARN domain, the SRv6 Policy can also be mapped to the ARN ID of the next domain. Like ingress processing, there will be an egress mapping table. The mapping operation is quite similar to VLAN translation.</t>

</section>
<section anchor="access-control"><name>Access Control</name>

<t>Before trusting the incoming ARN ID of the packet outside limited domain, verification is necessary.</t>

<t>The user facing interface should support configuration option to enable or disable the ARN function. When a network edge device receives a packet carrying an ARN ID, if the ARN function on the interface is enabled, it should perform ARN related access control and  forwarding processing on the packet. If the ARN function on the interface is disabled, the ARN ID in the packet should be ignored, that is, the processing associated with ARN should be skipped.</t>

<t>The received packet contains source information of the packet, such as source address, PPPoE, tunnel, and other information, which is used to identify subscribers. When the ARN function is enabled on the interface, access control verification can be performed based on the sender's information and the ARN ID in the packet; after successful verification, forwarding is carried out based on the ARN ID.</t>

<t>If the verification is failed, the ARN ID in the packet should be ignored, that is, the processing associated with ARN should be skipped.</t>

<t>Access control requires a pre-configured ARN ID verification table to verify the source information and ARN ID in the packet. The ARN ID verification table is pre-populated with the following information:</t>

<t><list style="symbols">
  <t>The source information of the packet, which represents the subscriber.</t>
  <t>The subscribed ARN ID.</t>
  <t>The mapping relationship between the ARN ID and network services (such as SR Policy/Flex Algo).</t>
</list></t>

<t>This table is used to verify the source information and ARN ID in the packet. If ARN ID is valid, the network edge device will perform path mapping function and rate limiting, then do packet forwarding. Otherwise, the ARN ID is cleared or the packet is discarded.</t>

</section>
<section anchor="cross-domain-aggregation-and-mapping"><name>Cross-domain Aggregation and Mapping</name>

<t>The network edge device in current domain(domain A) receives the message with the A ARN ID which is sent by another network edge device, and queries the B ARN ID of A ARN ID mapped in the target domain from a predetermined cross-domain mapping relationship. Then it replaces A ARN ID with B ARN ID to obtain the new message and sends it to the device in target domain(domain B).
After the controller of current domain receives the request of allocating ARN ID in the target domain, it will establish cross-domain mapping relationship to achieve the mapping of ARN ID between  in the current domain and target domain for the same application-required netwoik path and send it to the netwoik edge devices.
The ARN ID configured in flow label，Destination Option Header （DOH），or Hop-by-Hop Option Header(HBH) is changed to the new ARN ID, then the modified message is obtained and sended the target domain.</t>

</section>
<section anchor="service-funtion-chain-based-on-arn"><name>Service Funtion Chain Based on ARN</name>

<t>In the SRv6 SFC scenario, the traditional solution of SRv6 SFC requires allocating SIDs for each service (including each SF or each user) and advertising relevant routes, leading to high complexity in the number of SIDs and routes, which makes it impossible to truly implement. The ARN-based approach can greatly simplify this SID and route allocation mechanism. It only uses ARN IDs to integrate network and service capabilities, while SIDs are only used as network path identifiers, reducing the coupling with services.</t>

<t>The gateway device of SFC received and parsed the SID in the service flow. According to the instruction information of the SID function, the IPv6 packet in the service flow and the corresponding extension header are parsed to obtain the application and network capability identifier(that is ARN ID), which is used to indicate the service function SF. Furthermore, the outgoing interface or IP address to the next-hop node corresponding to the SF indicated by the ARN ID is obtained. According to the association table sent by the controller device (or statically configured), the outgoing interface or IP address to the next-hop node corresponding to the SF indicated by ARN ID is searched, including the association between SF and destination IP address or between SF and virtual interface.</t>

</section>
<section anchor="rate-limiting"><name>Rate Limiting</name>

<t>Imposes traffic limits on specific ARN IDs, typically deployed at the network edge device.</t>

</section>
</section>
<section anchor="controller"><name>Controller</name>

<t>The controller generates ARN IDs in the way mentioned in <xref target="arnid"/>. The controller also configures user edge devices and network edge devices, and manages the lifecycle of ARN IDs.</t>

<t>The controller will send the ARN ID and the application characteristics corresponding to the ARN ID to the user edge device.</t>

<t>The controller will send user information and ARN ID preset correspondence information to network edge device, which is used for access control. At the same time, the controller will send the path information and the preset correspondence of the ARN ID to the network edge device, and the path information can be SR Policy.</t>

<t>A single controller can be centrally used, or multiple controllers can be utilized to collectively fulfill the functions across various stages of the network.</t>

</section>
<section anchor="the-southbound-interface-sbi-of-the-controller"><name>The Southbound Interface (SBI) of the Controller</name>

<t>The ARN ID and ARN service policies are transmitted from the controller to the relevant network devices for execution through this interface. Candidate protocols for this interface include PCEP, BGP, and YANG-based protocols (NETCONF/RESTCONF).</t>

</section>
</section>
<section anchor="encapsulation"><name>ARN Encapsulation</name>

<section anchor="locations-for-ipv6-arn"><name>Locations for IPv6 ARN</name>

<t>ARN carries ARN ID option including ARN ID through the extension of the IPv6 data plane. The location for carrying this information is within the IPv6 Destination Options Header (DOH) or IPv6 Hop-by-Hop Options Header (HBH).</t>

<t>The ARN ID option can be carried in the IPv6 Destination Options Header. By using the DOH Options Header, the information carried can be read by the destination node but would not normally be seen by other nodes along the path.</t>

<t>The ARN ID option can be carried in the IPv6 Hop-by-Hop Options Header. By using the HBH Options Header, the information carried can be read by every node along the path.</t>

<figure align="center" title="ARN ID Option"><artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Next Header  |  Hdr Ext Len  | Option Type   | Opt Data Len  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           ARN ID                              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Option Type: 8 Bits, ARN option, value to be allocated
ARN ID: 32 Bits

]]></artwork></figure>

</section>
<section anchor="locations-for-ipv4-arn"><name>Locations for IPv4 ARN</name>

<t>TBD.</t>

</section>
</section>
<section anchor="use-cases"><name>Use Cases</name>

<figure align="center" title="Use case of ARN"><artwork type="ascii-art"><![CDATA[
             +---------------------+
             | Network Controller  |
             +----+------------+---+
                  |            |
              +---+--+      +--+---+     +-------+
              |      |   A  |      |     |       |
+-----+       | Back +------+ Back |     |  DC   | 
| HGW |------>| bone |   B  | bone |     | Cloud |
+-----+       | Edge +------+ Edge +-----+       |
  User        |      |   C  |      |     |       |
              | Bras +------+      |     |Service|
              +------+      +------+     +-------+

]]></artwork></figure>

<t>This is a typical network where users access the network through a Bras server, then via the backbone network, and finally access the data center cloud services.
Functions implemented by each device:</t>

<t>Home Gate Way(HGW): Acts as the user edge device, ARN ID can be directly marked by it based on the services user has purchased and flow characteristics of the application.</t>

<t>Bras: Provides functions such as access control based on Service-ID, path mapping, service aggregation, and rate limiting. If the incoming datagram carries an ARN ID, and the receiving interface has turned on ARN. The legitimacy of the ARN ID can be verified. If the ARN ID does not belong to the user, the verification will fail, and the ARN ID will be cleared or the entire datagram will be discarded. Otherwise, it will perform Path Mapping based on incoming ARN ID.</t>

<t>Network Controller: Configure user information and ARN ID mappings for HGW. Configure access control, path mapping, and rate limiting based on ARN ID for Bras.</t>

<t>Cloud Services: Provides specific application services.</t>

<t>Based on the different types of ARN services purchased by users, when mapping paths in the domain for forwarding user traffic, three network paths can be chosen according to the rules deployed by the controller to meet the users' network requirements. As different applications may have varying network demands, the five-tuple of the datagrams is mapped to corresponding ARN IDs for different network services. This enables the network's entry router to select different network paths based on the different ARN IDs:</t>

<t><list style="symbols">
  <t>Network Path A: Network path characterized by high bandwidth</t>
  <t>Network Path B: Network path characterized by low latency</t>
  <t>Network Path C: Network path characterized by low packet loss</t>
</list></t>

<t>If a user's different applications have varying network requirements, the user can directly include the corresponding network service's ARN ID in the transmitted datagrams. This allows the network's entry router to select different network paths based on the different ARN IDs.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>Option type number in the header should be allocated.</t>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>This document will not affect the security of the Internet.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>
<reference anchor="RFC8402">
  <front>
    <title>Segment Routing Architecture</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="R. Shakir" initials="R." surname="Shakir"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
      <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
      <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8402"/>
  <seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>
<reference anchor="RFC8754">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>
<reference anchor="RFC8986">
  <front>
    <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="Z. Li" initials="Z." surname="Li"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
      <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
      <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8986"/>
  <seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>




    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Halpern" fullname="Joel Halpern">
      <organization></organization>
      <address>
        <email>jmh@joelhalpern.com</email>
      </address>
    </contact>
<t>Many thanks to Joel Halpern for reviewing the ARN ID mapping mechanism.</t>

    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

