rfc9473.original.xml | rfc9473.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
<!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
<!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
<!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
]> | ]> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.11 --> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" submissionType | |||
<?rfc toc="yes"?> | ="IRTF" category="info" consensus="true" docName="draft-irtf-panrg-path-properti | |||
<?rfc sortrefs="yes"?> | es-08" number="9473" obsoletes="" updates="" | |||
<?rfc symrefs="yes"?> | xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3"> | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | ||||
-irtf-panrg-path-properties-08" category="info" obsoletes="" updates="" submissi | ||||
onType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" ver | ||||
sion="3"> | ||||
<!-- xml2rfc v2v3 conversion 3.10.0 --> | ||||
<front> | <front> | |||
<title abbrev="Path Properties">A Vocabulary of Path Properties</title> | <title abbrev="Path Properties">A Vocabulary of Path Properties</title> | |||
<seriesInfo name="Internet-Draft" value="draft-irtf-panrg-path-properties-08 "/> | <seriesInfo name="RFC" value="9473"/> | |||
<author initials="R." surname="Enghardt" fullname="Reese Enghardt"> | <author initials="R." surname="Enghardt" fullname="Reese Enghardt"> | |||
<organization>Netflix</organization> | <organization>Netflix</organization> | |||
<address> | <address> | |||
<email>ietf@tenghardt.net</email> | <email>ietf@tenghardt.net</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl"> | <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl"> | |||
<organization>ETH Zürich</organization> | <organization>ETH Zürich</organization> | |||
<address> | <address> | |||
<email>cyrill.kraehenbuehl@inf.ethz.ch</email> | <email>cyrill.kraehenbuehl@inf.ethz.ch</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2023" month="March" day="06"/> | <date year="2023" month="September"/> | |||
<area>IRTF</area> | <workgroup>Path Aware Networking</workgroup> | |||
<workgroup>PANRG</workgroup> | ||||
<keyword>Internet-Draft</keyword> | <keyword>PAN</keyword> | |||
<keyword>path-aware network</keyword> | ||||
<keyword>path property</keyword> | ||||
<keyword>path selection</keyword> | ||||
<abstract> | <abstract> | |||
<t>This document is a product of the Path Aware Networking Research Group | <t>Path properties express information about paths across a | |||
(PANRG). | network and the services provided via such paths. In a path-aware | |||
Path properties express information about paths across a network and the service | network, path properties may be fully or partially available to entities | |||
s provided via such paths. | such as endpoints. This document defines and categorizes path | |||
In a path-aware network, path properties may be fully or partially available to | properties. Furthermore, the document identifies several path | |||
entities such as endpoints. | properties that might be useful to endpoints or other entities, e.g., | |||
This document defines and categorizes path properties. | for selecting between paths or for invoking some of the provided | |||
Furthermore, the document identifies several path properties which might be usef | services. This document is a product of the Path Aware Networking | |||
ul to endpoints or other entities, | Research Group (PANRG).</t> | |||
e.g., for selecting between paths or for invoking some of the provided services. | ||||
</t> | ||||
</abstract> | </abstract> | |||
<note removeInRFC="true"> | ||||
<name>Discussion Venues</name> | ||||
<t>Discussion of this document takes place on the | ||||
"Path-Aware Networking Research Group" mailing list (PANRG), | ||||
which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ | ||||
panrg/"/>. | ||||
Subscription information is at <eref target="https://www.ietf.org/mailman/li | ||||
stinfo/panrg/"/>.</t> | ||||
<t>Source for this draft and an issue tracker can be found at | ||||
<eref target="https://github.com/panrg/path-properties/"/>.</t> | ||||
</note> | ||||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="introduction" numbered="true" toc="default"> | <section anchor="introduction" numbered="true" toc="default"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t>The current Internet architecture does not explicitly support endpoint | <t>The current Internet architecture does not explicitly support | |||
discovery of forwarding paths through the network nor the discovery of propertie | endpoint discovery of forwarding paths through the network nor the | |||
s and services associated with these paths. | discovery of properties and services associated with these paths. | |||
Path-aware networking, as defined in Section 1.1 of <xref target="RFC9217" forma | Path-aware networking, as defined in <xref target="RFC9217" | |||
t="default"/>, describes | sectionFormat="of" section="1.1"/>, describes "endpoint discovery of the | |||
"endpoint discovery of the properties of paths they use for communication across | properties of paths they use for communication across an internetwork, | |||
an internetwork, and endpoint reaction to these properties that affects routing | and endpoint reaction to these properties that affects routing and/or | |||
and/or data transfer". | data transfer". This document provides a generic definition of path | |||
This document provides a generic definition of path properties, addressing the f | properties, addressing the first of the questions in path-aware | |||
irst of the questions in path-aware networking <xref target="RFC9217" format="de | networking <xref target="RFC9217" format="default"/>.</t> | |||
fault"/>.</t> | <t>As terms related to paths have been used with different meanings in | |||
<t>As terms related to paths have been used with different meanings in dif | different areas of networking, first, this document provides a common | |||
ferent areas of networking, first, this document provides a common terminology t | terminology to define paths, path elements, and flows. Based on these | |||
o define paths, path elements, and flows. Based on these terms, the document def | terms, the document defines path properties. Then, this document | |||
ines path properties. | provides some examples of use cases for path properties. Finally, the | |||
Then, this document provides some examples of use cases for path properties. | document lists several path properties that may be useful for the | |||
Finally, the document lists several path properties that may be useful for the m | mentioned use cases. This list is intended to be neither exhaustive nor | |||
entioned use cases. This list is intended to be neither exhaustive nor definitiv | definitive.</t> | |||
e.</t> | <t>Note that this document does not assume that any of the listed path | |||
<t>Note that this document does not assume that any of the listed path pro | properties are actually available to any entity. The question of how | |||
perties are actually available to any entity. The question of how entities can d | entities can discover and distribute path properties in a trustworthy | |||
iscover and distribute path properties in a trustworthy way is out of scope for | way is out of scope for this document.</t> | |||
this document.</t> | ||||
<t>This document represents the consensus of the Path Aware Networking Res earch Group (PANRG).</t> | <t>This document represents the consensus of the Path Aware Networking Res earch Group (PANRG).</t> | |||
</section> | </section> | |||
<section anchor="terminology" numbered="true" toc="default"> | <section anchor="terminology" numbered="true" toc="default"> | |||
<name>Terminology</name> | <name>Terminology</name> | |||
<dl> | <dl spacing="normal" newline="false"> | |||
<dt> | <dt>Entity:</dt> | |||
Entity: </dt> | ||||
<dd> | <dd> | |||
<t>A physical or virtual device or function, or a collection of device | <t>A physical or virtual device or function, or a collection of | |||
s or functions, which plays a role related to path-aware networking for particul | devices or functions, that plays a role related to path-aware | |||
ar paths and flows. | networking for particular paths and flows. An entity can be on-path | |||
An entity can be on-path or off-path: On the path, an entity may participate in | or off-path. On the path, an entity may participate in forwarding | |||
forwarding the flow, i.e., what may be called data plane functionality. | the flow, i.e., what may be called "data plane functionality". On or | |||
On or off the path, an entity may influence aspects of how the flow is forwarded | off the path, an entity may influence aspects of how the flow is | |||
, i.e., what may be called control plane functionality, such as Path Selection o | forwarded, i.e., what may be called "control plane functionality", | |||
r Service Invocation. | such as path selection or service invocation. An entity influencing | |||
An entity influencing forwarding aspects is usually aware of path properties, e. | forwarding aspects is usually aware of path properties, e.g., by | |||
g., by observing or measuring them or by learning them from another entity.</t> | observing or measuring them or by learning them from another | |||
entity.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Node:</dt> | |||
Node: </dt> | ||||
<dd> | <dd> | |||
<t>An on-path entity which processes packets, e.g., sends, receives, f | <t>An on-path entity that processes packets, e.g., sends, receives, | |||
orwards, or modifies them. A node may be physical or virtual, e.g., a physical d | forwards, or modifies them. A node may be physical or virtual, e.g., | |||
evice, a service function provided as a virtual element, or even a single queue | a physical device, a service function provided as a virtual element, | |||
within a switch. A node may also be an entity which consists of a collection of | or even a single queue within a switch. A node may also be an entity | |||
devices or functions, e.g., an entire Autonomous System (AS).</t> | that consists of a collection of devices or functions, e.g., an | |||
entire Autonomous System (AS).</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Link:</dt> | |||
Link: </dt> | ||||
<dd> | <dd> | |||
<t>A medium or communication facility that connects two or more nodes | <t>A medium or communication facility that connects two or more | |||
with each other. A link enables a node to send packets to other nodes. | nodes with each other. A link enables a node to send packets to | |||
Links can be physical, e.g., a Wi-Fi network which connects an Access Point to s | other nodes. Links can be physical, e.g., a Wi-Fi network that | |||
tations, or virtual, e.g., a virtual switch which connects two virtual machines | connects an Access Point to stations, or virtual, e.g., a virtual | |||
hosted on the same physical machine. A link is unidirectional. As such, bidirect | switch that connects two virtual machines hosted on the same | |||
ional communication can be modeled as two links between the same nodes in opposi | physical machine. A link is unidirectional. As such, bidirectional | |||
te directions.</t> | communication can be modeled as two links between the same nodes in | |||
opposite directions.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Path element:</dt> | |||
Path element: </dt> | ||||
<dd> | <dd> | |||
<t>Either a node or a link. For example, a path element can be an Abst | <t>Either a node or a link. For example, a path element can be an | |||
ract Network Element (ANE) as defined in <xref target="I-D.ietf-alto-path-vector | Abstract Network Element (ANE) as defined in <xref target="RFC9275" | |||
" format="default"/>.</t> | format="default"/>.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Path:</dt> | |||
Path: </dt> | ||||
<dd> | <dd> | |||
<t>A sequence of adjacent path elements over which a packet can be tra | <t>A sequence of adjacent path elements over which a packet can be | |||
nsmitted, starting and ending with a node. | transmitted, starting and ending with a node.</t> | |||
</t> | <t>Paths are unidirectional and time dependent, i.e., there can be a | |||
<t>Paths are unidirectional and time-dependent, i.e., there can be a v | variety of paths from one node to another, and the path over which | |||
ariety of paths from one node to another, and the path over which packets are tr | packets are transmitted may change. A path definition can be strict | |||
ansmitted may change. | (i.e., the exact sequence of path elements remains the same) or | |||
A path definition can be strict (i.e., the exact sequence of path elements remai | loose (i.e., the start and end node remain the same, but the path | |||
ns the same) or loose (i.e., the start and end node remain the same, but the pat | elements between them may vary over time).</t> | |||
h elements between them may vary over time).</t> | <t>The representation of a path and its properties may depend on the | |||
<t>The representation of a path and its properties may depend on the e | entity considering the path. On the one hand, the representation | |||
ntity considering the path. | may differ due to entities having partial visibility of path | |||
On the one hand, the representation may differ due to entities having partial vi | elements comprising a path or their visibility changing over time. | |||
sibility of path elements comprising a path or their visibility changing over ti | On the other hand, the representation may differ due to treating | |||
me. | path elements at different levels of abstraction. For example, a | |||
On the other hand, the representation may differ due to treating path elements a | path may be given as a sequence of physical nodes and the links | |||
t different levels of abstraction. | connecting these nodes, be given as a sequence of logical nodes such | |||
For example, a path may be given as a sequence of physical nodes and the links c | as a sequence of ASes or an Explicit Route Object (ERO), or only | |||
onnecting these nodes, a sequence of logical nodes such as a sequence of ASes or | consist of a specific source and destination that is known to be | |||
an Explicit Route Object (ERO), or only consist of a specific source and destin | reachable from that source.</t> | |||
ation which is known to be reachable from that source.</t> | <t>A multicast or broadcast setting where a packet is sent by one | |||
<t>A multicast or broadcast setting, where a packet is sent by one nod | node and received by multiple nodes is described by multiple paths | |||
e and received by multiple nodes, is described by multiple paths over which the | over which the packet is sent, one path for each combination of | |||
packet is sent, one path for each combination of sending and receiving node; the | sending and receiving node; these paths do not have to be disjoint | |||
se paths do not have to be disjoint as defined by the Disjointness path property | as defined by the disjointness path property, see <xref | |||
, see <xref target="examples" format="default"/>.</t> | target="examples" format="default"/>.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Endpoint:</dt> | |||
Endpoint: </dt> | ||||
<dd> | <dd> | |||
<t>The endpoints of a path are the start and end node of the path. For | <t>The endpoints of a path are the start and end node of the | |||
example, an endpoint can be a host as defined in <xref target="RFC1122" format= | path. For example, an endpoint can be a host as defined in <xref | |||
"default"/>, which can be a client (e.g., a node running a web browser) or a ser | target="RFC1122" format="default"/>, which can be a client (e.g., a | |||
ver (e.g., a node running a web server).</t> | node running a web browser) or a server (e.g., a node running a web | |||
server).</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Reverse Path:</dt> | |||
Reverse Path: </dt> | ||||
<dd> | <dd> | |||
<t>The path that is used by a remote node in the context of bidirectio | <t>The path that is used by a remote node in the context of | |||
nal communication.</t> | bidirectional communication.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Subpath:</dt> | |||
Subpath: </dt> | ||||
<dd> | <dd> | |||
<t>Given a path, a subpath is a sequence of adjacent path elements of | <t>Given a path, a subpath is a sequence of adjacent path elements | |||
this path.</t> | of this path.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Flow:</dt> | |||
Flow: </dt> | ||||
<dd> | <dd> | |||
<t>One or multiple packets to which the traits of a path or set of sub | <t>One or multiple packets to which the traits of a path or set of | |||
paths may be applied in a functional sense. For example, a flow can consist of a | subpaths may be applied in a functional sense. For example, a flow | |||
ll packets sent within a TCP session with the same five-tuple between two hosts, | can consist of all packets sent within a TCP session with the same | |||
or it can consist of all packets sent on the same physical link.</t> | five-tuple between two hosts, or it can consist of all packets sent | |||
on the same physical link.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Property:</dt> | |||
Property: </dt> | ||||
<dd> | <dd> | |||
<t>A trait of one or a sequence of path elements, or a trait of a flow | <t>A trait of one or a sequence of path elements, or a trait of a | |||
with respect to one or a sequence of path elements. An example of a link proper | flow with respect to one or a sequence of path elements. An example | |||
ty is the maximum data rate that can be sent over the link. An example of a node | of a link property is the maximum data rate that can be sent over | |||
property is the administrative domain that the node belongs to. An example of a | the link. An example of a node property is the administrative domain | |||
property of a flow with respect to a subpath is the aggregated one-way delay of | that the node belongs to. An example of a property of a flow with | |||
the flow being sent from one node to another node over this subpath. | respect to a subpath is the aggregated one-way delay of the flow | |||
A property is thus described by a tuple containing the path element(s), the flow | being sent from one node to another node over this subpath. A | |||
or an empty set if no packets are relevant for the property, the name of the pr | property is thus described by a tuple containing the path | |||
operty (e.g., maximum data rate), and the value of the property (e.g., 1Gbps).</ | element(s), the flow or an empty set if no packets are relevant for | |||
t> | the property, the name of the property (e.g., maximum data rate), | |||
and the value of the property (e.g., 1 Gbps).</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Aggregated property:</dt> | |||
Aggregated property: </dt> | ||||
<dd> | <dd> | |||
<t>A collection of multiple values of a property into a single value, | <t>A collection of multiple values of a property into a single | |||
according to a function. A property can be aggregated over multiple path element | value, according to a function. A property can be aggregated | |||
s (i.e., a subpath), e.g., the MTU of a path as the minimum MTU of all links on | over:</t> | |||
the path, over multiple packets (i.e., a flow), e.g., the median one-way latency | <ul spacing="normal"> | |||
of all packets between two nodes, or over both, e.g., the mean of the queueing | <li>multiple path elements (i.e., a subpath), for example, the MTU | |||
delays of a flow on all nodes along a path. | of a path as the minimum MTU of all links on the path,</li> | |||
The aggregation function can be numerical, e.g., median, sum, minimum, it can be | <li>multiple packets (i.e., a flow), for example, the median | |||
logical, e.g., "true if all are true", "true if at least 50% of values are true | one-way latency of all packets between two nodes,</li> | |||
", or an arbitrary function which maps multiple input values to an output value. | <li>or both path elements and packets, for example, the mean of | |||
</t> | the queueing delays of a flow on all nodes along a path.</li> | |||
</ul> | ||||
<t>The aggregation function can be numerical (e.g., median, sum, | ||||
minimum) or logical (e.g., "true if all are true", "true if at | ||||
least 50% of values are true"), or it can be an arbitrary function | ||||
that maps multiple input values to an output value.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Observed property:</dt> | |||
Observed property: </dt> | ||||
<dd> | <dd> | |||
<t>A property that is observed for a specific path element, subpath, o | <t>A property that is observed for a specific path element, subpath, | |||
r path, e.g., using measurements. For example, the one-way delay of a specific p | or path. A property may be observed using measurements, for example, | |||
acket transmitted from one node to another node can be measured.</t> | the one-way delay of a specific packet transmitted from node to | |||
node.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Assessed property:</dt> | |||
Assessed property: </dt> | ||||
<dd> | <dd> | |||
<t>An approximate calculation or assessment of the value of a property | <t>An approximate calculation or assessment of the value of a | |||
. An assessed property includes the reliability of the calculation or assessment | property. An assessed property includes the reliability of the | |||
. The notion of reliability depends on the property. | calculation or assessment. The notion of reliability depends on the | |||
For example, a path property based on an approximate calculation may describe th | property. For example, a path property based on an approximate | |||
e expected median one-way latency of packets sent on a path within the next seco | calculation may describe the expected median one-way latency of | |||
nd, including the confidence level and interval. A non-numerical assessment may | packets sent on a path within the next second, including the | |||
instead include the likelihood that the property holds.</t> | confidence level and interval. A non-numerical assessment may | |||
instead include the likelihood that the property holds.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Target property:</dt> | |||
Target property: </dt> | ||||
<dd> | <dd> | |||
<t>An objective that is set for a property over a path element, subpat | <t>An objective that is set for a property over a path element, | |||
h, or path. | subpath, or path. Note that a target property can be set for | |||
Note that a target property can be set for observed properties, such as one-way | observed properties, such as one-way delay, and also for properties | |||
delay, but also for properties that cannot be observed by the entity setting the | that cannot be observed by the entity setting the target, such as | |||
target, such as inclusion of certain nodes on a path.</t> | inclusion of certain nodes on a path.</t> | |||
</dd> | </dd> | |||
</dl> | </dl> | |||
<section anchor="terminology-usage-for-specific-technologies" numbered="tr ue" toc="default"> | <section anchor="terminology-usage-for-specific-technologies" numbered="tr ue" toc="default"> | |||
<name>Terminology usage for specific technologies</name> | <name>Terminology Usage for Specific Technologies</name> | |||
<t>The terminology defined in this document is intended to be general an | <t>The terminology defined in this document is intended to be general | |||
d applicable to existing and future path-aware technologies. | and applicable to existing and future path-aware technologies. Using | |||
Using this terminology, a path-aware technology can define and consider specific | this terminology, a path-aware technology can define and consider | |||
path elements and path properties on a specific level of abstraction. | specific path elements and path properties on a specific level of | |||
For instance, a technology may define path elements as IP routers, e.g., in sour | abstraction. For instance, a technology may define path elements as | |||
ce routing (<xref target="RFC1940" format="default"/>). Alternatively, it may co | IP routers, e.g., in source routing <xref target="RFC1940" | |||
nsider path elements on a different layer of the Internet Architecture (<xref ta | format="default"/>. Alternatively, it may consider path elements on a | |||
rget="RFC1122" format="default"/>) or as a collection of entities not tied to a | different layer of the Internet architecture <xref target="RFC1122" | |||
specific layer, such as an AS or an ERO. | format="default"/> or as a collection of entities not tied to a | |||
Even within a single path-aware technology, specific definitions might differ de | specific layer, such as an AS or ERO. Even within a single path-aware | |||
pending on the context in which they are used. | technology, specific definitions might differ depending on the context | |||
For example, the endpoints might be the communicating hosts in the context of th | in which they are used. For example, the endpoints might be the | |||
e transport layer, ASes that contain the hosts in the context of routing, or spe | communicating hosts in the context of the transport layer, ASes that | |||
cific applications in the context of the application layer.</t> | contain the hosts in the context of routing, or specific applications | |||
in the context of the application layer.</t> | ||||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="use-cases" numbered="true" toc="default"> | <section anchor="use-cases" numbered="true" toc="default"> | |||
<name>Use Cases for Path Properties</name> | <name>Use Cases for Path Properties</name> | |||
<t>When a path-aware network exposes path properties to endpoints or other | <t>When a path-aware network exposes path properties to endpoints or | |||
entities, | other entities, these entities may use this information to achieve | |||
these entities may use this information to achieve different goals. | different goals. This section lists several use cases for path | |||
This section lists several use cases for path properties.</t> | properties.</t> | |||
<t>Note that this is not an exhaustive list, as with every new technology | <t>Note that this is not an exhaustive list; as with every new | |||
and protocol, novel use cases may emerge, and new path properties may become rel | technology and protocol, novel use cases may emerge, and new path | |||
evant. | properties may become relevant. Moreover, for any particular | |||
Moreover, for any particular technology, entities may have visibility of and con | technology, entities may have visibility of and control over different | |||
trol over different path elements and path properties, and consider them on diff | path elements and path properties and consider them on different levels | |||
erent levels of abstraction. | of abstraction. Therefore, a new technology may implement an existing | |||
Therefore, a new technology may implement an existing use case related to differ | use case related to different path elements or on a different level of | |||
ent path elements or on a different level of abstraction.</t> | abstraction.</t> | |||
<section anchor="path-selection" numbered="true" toc="default"> | <section anchor="path-selection" numbered="true" toc="default"> | |||
<name>Path Selection</name> | <name>Path Selection</name> | |||
<t>Nodes may be able to send flows via one (or a subset) out of multiple | <t>Nodes may be able to send flows via one (or a subset) out of | |||
possible paths, and an entity may be able to influence the decision which path( | multiple possible paths, and an entity may be able to influence the | |||
s) to use. | decision about which path(s) to use. Path selection may be feasible | |||
Path Selection may be feasible if there are several paths to the same destinatio | if there are several paths to the same destination (e.g., in case of a | |||
n (e.g., in case of a mobile device with two wireless interfaces, both providing | mobile device with two wireless interfaces, both providing a path) or | |||
a path), or if there are several destinations, and thus several paths, providin | if there are several destinations, and thus several paths, providing | |||
g the same service (e.g., Application-Layer Traffic Optimization (ALTO) <xref ta | the same service (e.g., Application-Layer Traffic Optimization (ALTO) | |||
rget="RFC5693" format="default"/>, an application layer peer-to-peer protocol al | <xref target="RFC5693" format="default"/>, an application layer | |||
lowing endpoints a better-than-random peer selection). | peer-to-peer protocol allowing endpoints a better-than-random peer | |||
Entities can express their intent to achieve a specific goal by specifying targe | selection). Entities can express their intent to achieve a specific | |||
t properties for their paths, e.g., related to performance or security. | goal by specifying target properties for their paths, e.g., related to | |||
Then, paths can be selected which best meet the target properties, e.g., the ent | performance or security. Then, paths can be selected that best meet | |||
ity can select these paths from all available paths or express the target proper | the target properties, e.g., the entity can select these paths from | |||
ties to the network and rely on the network to select appropriate paths.</t> | all available paths or express the target properties to the network | |||
<t>Target properties relating to network performance typically refer to | and rely on the network to select appropriate paths.</t> | |||
observed properties, such as One-Way Delay, One-Way Packet Loss, and Link Capaci | <t>Target properties relating to network performance typically refer | |||
ty. | to observed properties, such as one-way delay, one-way packet loss, | |||
Entities then select paths based on their target property and the assessed prope | and link capacity. Entities then select paths based on their target | |||
rty of the available paths that best match the application requirements. | property and the assessed property of the available paths that best | |||
For such performance-related target properties, the observed property is similar | match the application requirements. For such performance-related | |||
to a service level indicator (SLI) and the assessed property is similar to a se | target properties, the observed property is similar to a Service Level | |||
rvice level objective (SLO) for IETF network slices <xref target="I-D.ietf-teas- | Indicator (SLI), and the assessed property is similar to a Service | |||
ietf-network-slices" format="default"/>. | Level Objective (SLO) for IETF Network Slices <xref | |||
As an example path selection strategy, for sending a small delay-sensitive query | target="I-D.ietf-teas-ietf-network-slices" format="default"/>. As an | |||
, an entity may select a path with a short One-Way Delay, while for retrieving a | example path-selection strategy, an entity may select a path with a | |||
large file, it may select a path with high Link Capacities on all links.</t> | short one-way delay for sending a small delay-sensitive query, while | |||
<t>It is also possible for an entity to set target properties which it c | it may select a path with high link capacities on all links for | |||
annot (directly) observe, similar to service level expectations (SLEs) for IETF | retrieving a large file.</t> | |||
network slices <xref target="I-D.ietf-teas-ietf-network-slices" format="default" | <t>It is also possible for an entity to set target properties that it | |||
/>. | cannot (directly) observe, similar to Service Level Expectations | |||
For example, this can apply to security-related target properties and path selec | (SLEs) for IETF Network Slices <xref | |||
tion, such as allowing or disallowing sending flows over paths that involve spec | target="I-D.ietf-teas-ietf-network-slices" format="default"/>. This | |||
ific networks or nodes to enforce traffic policies or mandating that all enterpr | may apply to security-related target properties (e.g., to mandate that | |||
ise traffic goes through a specific firewall.</t> | all enterprise traffic goes through a specific firewall) and path | |||
<t>Care needs to be taken when selecting paths based on observed path pr | selection (e.g., to enforce traffic policies by allowing or disallowing | |||
operties, as path properties that were previously measured may not be helpful in | sending flows over paths that involve specific networks or nodes).</t> | |||
predicting current or future path properties and such path selection may lead t | <t>Care needs to be taken when selecting paths based on observed path | |||
o unintended feedback loops. Also, there may be trade-offs between path properti | properties, as path properties that were previously measured may not | |||
es (e.g., One-Way Delay and Link Capacity), and entities may influence these tra | be helpful in predicting current or future path properties, and such | |||
de-offs with their choices. | path selection may lead to unintended feedback loops. Also, there may | |||
Finally, path selection may impact fairness. | be trade-offs between path properties (e.g., one-way delay and link | |||
For example, if multiple entities concurrently attempt to meet their target prop | capacity), and entities may influence these trade-offs with their | |||
erties using the same network resources, one entity's choices may influence the | choices. Finally, path selection may impact fairness. For example, | |||
conditions on the path as experienced by flows of another entity.</t> | if multiple entities concurrently attempt to meet their target | |||
<t>As a baseline, a path selection algorithm should aim to do a better j | properties using the same network resources, one entity's choices may | |||
ob at meeting the target properties, and consequently accommodating the user's r | influence the conditions on the path as experienced by flows of | |||
equirements, than the default case of not selecting a path most of the time.</t> | another entity.</t> | |||
<t>Path selection can be done either by the communicating node(s) or by | ||||
other entities within the network: | <t>As a baseline, a path-selection algorithm should aim to do a better | |||
A network (e.g., an AS) can adjust its path selection for internal or external r | job of meeting the target properties, and consequently accommodating | |||
outing based on path properties. | the user's requirements, than the default case of not selecting a path | |||
In BGP, the Multi Exit Discriminator (MED) attribute is used in the decision-mak | most of the time.</t> | |||
ing process to select which path to choose among those having the same AS PATH l | <t>Path selection can be done either by the communicating node(s) or | |||
ength and origin <xref target="RFC4271" format="default"/>; in a path-aware netw | by other entities within the network. A network (e.g., an AS) can | |||
ork, instead of using this single MED value, other properties such as Link Capac | adjust its path selection for internal or external routing based on | |||
ity or Link Usage could additionally be used to improve load balancing or perfor | path properties. In BGP, the Multi-Exit Discriminator (MED) attribute | |||
mance <xref target="I-D.ietf-idr-performance-routing" format="default"/>.</t> | is used in the decision-making process to select which path to choose | |||
among those having the same AS path length and origin <xref | ||||
target="RFC4271" format="default"/>; in a path-aware network, instead | ||||
of using this single MED value, other properties such as link capacity | ||||
or link usage could additionally be used to improve load balancing or | ||||
performance <xref target="I-D.ietf-idr-performance-routing" | ||||
format="default"/>.</t> | ||||
</section> | </section> | |||
<section anchor="protocol-selection" numbered="true" toc="default"> | <section anchor="protocol-selection" numbered="true" toc="default"> | |||
<name>Protocol Selection</name> | <name>Protocol Selection</name> | |||
<t>Before sending data over a specific path, an entity may select an app | <t>Before sending data over a specific path, an entity may select an | |||
ropriate protocol or configure protocol parameters depending on path properties. | appropriate protocol or configure protocol parameters depending on | |||
For example, an endpoint may cache state on whether a path allows the use of QUI | path properties. For example, an endpoint may cache state if | |||
C <xref target="RFC9000" format="default"/> and if so, first attempt to connect | a path allows the use of QUIC <xref target="RFC9000" | |||
using QUIC before falling back to another protocol when connecting over this pat | format="default"/>; if so, it may first attempt to connect using QUIC | |||
h again. | before falling back to another protocol when connecting over this path | |||
A video streaming application may choose an (initial) video quality based on the | again. A video-streaming application may choose an (initial) video | |||
achievable data rate or the monetary cost of sending data (e.g., volume-base or | quality based on the achievable data rate or the monetary cost of | |||
flat-rate cost model).</t> | sending data (e.g., volume-based or flat-rate cost model).</t> | |||
</section> | </section> | |||
<section anchor="service-invocation" numbered="true" toc="default"> | <section anchor="service-invocation" numbered="true" toc="default"> | |||
<name>Service Invocation</name> | <name>Service Invocation</name> | |||
<t>In addition to path or protocol selection, an entity may choose to in | <t>In addition to path or protocol selection, an entity may choose to | |||
voke additional functions in the context of Service Function Chaining <xref targ | invoke additional functions in the context of Service Function | |||
et="RFC7665" format="default"/>, which may influence what nodes are on the path. | Chaining <xref target="RFC7665" format="default"/>, which may | |||
For example, a 0-RTT Transport Converter <xref target="RFC8803" format="default" | influence which nodes are on the path. For example, a 0-RTT Transport | |||
/> will be involved in a path only when invoked by an endpoint; such invocation | Converter <xref target="RFC8803" format="default"/> will be involved | |||
will lead to the use of MPTCP <xref target="RFC8684" format="default"/> or TCPin | in a path only when invoked by an endpoint; such invocation will lead | |||
c <xref target="RFC8547" format="default"/> <xref target="RFC8548" format="defau | to the use of Multipath TCP (MPTCP) <xref target="RFC8684" | |||
lt"/> capabilities while such use is not supported via the default forwarding pa | format="default"/> or tcpcrypt <xref target="RFC8548" | |||
th. | format="default"/> capabilities, while such use is not supported via | |||
Another example is a connection which is composed of multiple streams where each | the default forwarding path. Another example is a connection that is | |||
stream has specific service requirements. An endpoint may decide to invoke a gi | composed of multiple streams where each stream has specific service | |||
ven service function (e.g., transcoding) only for some streams while others are | requirements. An endpoint may decide to invoke a given service | |||
not processed by that service function.</t> | function (e.g., transcoding) only for some streams while others are | |||
not processed by that service function.</t> | ||||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="examples" numbered="true" toc="default"> | <section anchor="examples" numbered="true" toc="default"> | |||
<name>Examples of Path Properties</name> | <name>Examples of Path Properties</name> | |||
<t>This Section gives some examples of path properties which may be useful | <t>This section gives some examples of path properties that may be | |||
, e.g., for the use cases described in <xref target="use-cases" format="default" | useful, e.g., for the use cases described in <xref target="use-cases" | |||
/>.</t> | format="default"/>.</t> | |||
<t>Within the context of any particular technology, available path propert | <t>Within the context of any particular technology, available path | |||
ies may differ | properties may differ as entities have insight into and are able to | |||
as entities have insight into and are able to influence different path elements | influence different path elements and path properties. For example, an | |||
and path properties. | endpoint may have some visibility into path elements that are close and on | |||
For example, an endpoint may have some visibility into path elements that are on | a low | |||
a low level of abstraction and close, e.g., individual nodes within the first f | level of abstraction (e.g., individual nodes within the first | |||
ew hops, or it may have visibility into path elements that are far away and/or o | few hops), or it may have visibility into path elements that are far away | |||
n a higher level of abstraction, e.g., the list of ASes traversed. | and/or on a higher level of abstraction (e.g., the list of ASes | |||
This visibility may depend on factors such as the physical or network distance o | traversed). This visibility may depend on factors such as the physical | |||
r the existence of trust or contractual relationships between the endpoint and t | or network distance or the existence of trust or contractual | |||
he path element(s). | relationships between the endpoint and the path element(s). A path | |||
A path property can be defined relative to individual path elements, a sequence | property can be defined relative to individual path elements, a sequence | |||
of path elements, or "end-to-end", i.e., relative to a path that comprises of tw | of path elements, or "end-to-end", i.e., relative to a path that | |||
o endpoints and a single virtual link connecting them.</t> | comprises of two endpoints and a single virtual link connecting | |||
<t>Path properties may be relatively dynamic, e.g., the one-way delay of a | them.</t> | |||
packet sent over a specific path, or non-dynamic, e.g., the MTU of an Ethernet | <t>Path properties may be relatively dynamic, e.g., the one-way delay of | |||
link which only changes infrequently. | a packet sent over a specific path, or non-dynamic, e.g., the MTU of an | |||
Usefulness over time differs depending on how dynamic a property is: | Ethernet link that only changes infrequently. Usefulness over time | |||
The merit of a momentarily observed dynamic path propety may diminish greatly as | differs depending on how dynamic a property is: the merit of a | |||
time goes on, e.g., | momentarily observed dynamic path property may diminish greatly as time | |||
it is possible for the observed values of One-Way Delay to change on timescales | goes on, e.g., it is possible for the observed values of one-way delay | |||
which are shorter than the One-Way Delay between the measurement point and an en | to change on timescales that are shorter than the one-way delay between | |||
tity making a decision such as Path Selection, which may cause the measurement t | the measurement point and an entity making a decision such as path | |||
o be outdated when it reaches the decision-making entity. Therefore, consumers o | selection, which may cause the measurement to be outdated when it | |||
f dynamic path properties need to apply caution when using them, e.g., by aggreg | reaches the decision-making entity. Therefore, consumers of dynamic path | |||
ating them appropriately or applying a dampening function to their changes to av | properties need to apply caution when using them, e.g., by aggregating | |||
oiding oscillation. | them appropriately or applying a dampening function to their changes to | |||
In contrast, the observed value of a less dynamic path property might stay relev | avoid oscillation. In contrast, the observed value of a less dynamic | |||
ant for a longer period of time, e.g. a NAT typically stays on a particular path | path property might stay relevant for a longer period of time, e.g., a | |||
during the lifetime of a connection involving packets sent over this path.</t> | NAT typically stays on a particular path during the lifetime of a | |||
<dl> | connection involving packets sent over this path.</t> | |||
<dt> | <dl spacing="normal" newline="false"> | |||
Access Technology: </dt> | <dt>Access Technology:</dt> | |||
<dd> | <dd> | |||
<t>The physical or link layer technology used for transmitting or rece | <t>The physical- or link-layer technology used for transmitting or | |||
iving a flow on one or multiple path elements. If known, the Access Technology m | receiving a flow on one or multiple path elements. If known, the | |||
ay be given as an abstract link type, e.g., as Wi-Fi, Wired Ethernet, or Cellula | access technology may be given as an abstract link type, e.g., as | |||
r. It may also be given as a specific technology used on a link, e.g., 3GPP cell | Wi-Fi, wired Ethernet, or cellular. It may also be given as a | |||
ular, or 802.11 WiFi. Other path elements relevant to the access technology may | specific technology used on a link, e.g., 3GPP cellular or 802.11 | |||
include nodes related to processing packets on the physical or link layer, such | Wireless Local Area Network (WLAN). Other path elements relevant to | |||
as elements of a cellular core network. Note that there is no common registry of | the access technology may include nodes related to processing | |||
possible values for this property.</t> | packets on the physical or link layer, such as elements of a | |||
cellular core network. Note that there is no common registry of | ||||
possible values for this property.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Monetary Cost:</dt> | |||
Monetary Cost: </dt> | ||||
<dd> | <dd> | |||
<t>The price to be paid to transmit or receive a specific flow across | <t>The price to be paid to transmit or receive a specific flow | |||
a network to which one or multiple path elements belong.</t> | across a network to which one or multiple path elements belong.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Service Function:</dt> | |||
Service function: </dt> | ||||
<dd> | <dd> | |||
<t>A service function that a path element applies to a flow, see <xref | <t>A service function that a path element applies to a flow, see | |||
target="RFC7665" format="default"/>. Examples of abstract service functions inc | <xref target="RFC7665" format="default"/>. Examples of abstract | |||
lude firewalls, Network Address Translation (NAT), and TCP Performance Enhancing | service functions include firewalls, Network Address Translation | |||
Proxies. Some stateful service functions, such as NAT, need to observe the same | (NAT), and TCP Performance Enhancing Proxies. Some stateful service | |||
flow in both directions, e.g., by being an element of both the path and the rev | functions, such as NAT, need to observe the same flow in both | |||
erse path.</t> | directions, e.g., by being an element of both the path and the | |||
reverse path.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Transparency:</dt> | |||
Transparency: </dt> | ||||
<dd> | <dd> | |||
<t>When a node performs an action A on a flow F, the node is transpare | ||||
nt to F with respect to some (meta-)information M if the node performs A indepen | <t>When a node performs an action A on a flow F, the node is | |||
dently of M. | transparent to F with respect to some (meta-)information M if the | |||
M can for example be the existence of a protocol (header) in a packet or the con | node performs A independently of M. M can, for example, be the | |||
tent of a protocol header, payload, or both. | existence of a protocol (header) in a packet or the content of a | |||
For example, A can be blocking packets or reading and modifying (other protocol) | protocol header, payload, or both. For example, A can be blocking | |||
headers or payloads. | packets or reading and modifying (other protocol) headers or | |||
Transparency can be modeled using a function f, which takes as input F and M and | payloads. Transparency can be modeled using a function f, which | |||
outputs the action taken by the node. | takes as input F and M and outputs the action taken by the node. If | |||
If a taint analysis shows that the output of f is not tainted (impacted) by M or | a taint analysis shows that the output of f is not tainted | |||
if the output of f is constant for arbitrary values of M, then the node is cons | (impacted) by M, or if the output of f is constant for arbitrary | |||
idered to be transparent. | values of M, then the node is considered to be transparent. An IP | |||
An IP router could be transparent to transport protocol headers such as TCP/UDP | router could be transparent to transport protocol headers such as | |||
but not transparent to IP headers since its forwarding behavior depends on the I | TCP/UDP but not transparent to IP headers since its forwarding | |||
P headers. | behavior depends on the IP headers. A firewall that only allows | |||
A firewall that only allows outgoing TCP connections by blocking all incoming TC | outgoing TCP connections by blocking all incoming TCP SYN packets | |||
P SYN packets regardless of their IP address is transparent to IP but not to TCP | regardless of their IP address is transparent to IP but not to TCP | |||
headers. | headers. Finally, a NAT that actively modifies IP and TCP/UDP | |||
Finally, a NAT that actively modifies IP and TCP/UDP headers based on their cont | headers based on their content is not transparent to either IP or | |||
ent is not transparent to either IP or TCP/UDP headers. | TCP/UDP headers. Note that according to this definition, a node that | |||
Note that according to this definition, a node that modifies packets in accordan | modifies packets in accordance with the endpoints, such as a | |||
ce with the endpoints, such as a transparent HTTP proxy, as defined in <xref tar | transparent HTTP proxy, as defined in <xref target="RFC9110" | |||
get="RFC2616" format="default"/>, and a node listening and reacting to implicit | format="default"/>, and a node listening and reacting to implicit or | |||
or explicit signals, see <xref target="RFC8558" format="default"/>, are not cons | explicit signals, see <xref target="RFC8558" format="default"/>, are | |||
idered transparent. | not considered transparent.</t> | |||
</t> | <t>Transparency only applies to nodes and not to links, as a link | |||
<t>Transparency only applies to nodes and not to links, as a link cann | cannot modify or perform any other actions on the packets by | |||
ot modify or perform any other actions on the packets by itself. For example, if | itself. For example, if the content of a packet is altered when | |||
the content of a packet is altered when forwarded over a Generic Routing Encaps | forwarded over a Generic Routing Encapsulation (GRE) tunnel <xref | |||
ulation (GRE) tunnel <xref target="RFC2784" format="default"/><xref target="RFC7 | target="RFC2784" format="default"/> <xref target="RFC7676" | |||
676" format="default"/>, this document considers as nodes the software instances | format="default"/>, per this document the software instances that | |||
that terminate the tunnel over which the actions are performed; thus, the trans | terminate the tunnel are considered nodes over which the actions are | |||
parency definition applies to these nodes.</t> | performed; thus, the transparency definition applies to these | |||
nodes.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Administrative Domain:</dt> | |||
Administrative Domain: </dt> | ||||
<dd> | <dd> | |||
<t>The identity of an individual or an organization that controls acce | <t>The identity of an individual or an organization that controls | |||
ss to a path element (or several path elements). | access to a path element (or several path elements). Examples of | |||
Examples of administrative domains are an IGP area, an AS, or a service provider | administrative domains are an IGP area, an AS, or a service provider | |||
network.</t> | network.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Routing Domain Identifier:</dt> | |||
Routing Domain Identifier: </dt> | ||||
<dd> | <dd> | |||
<t>An identifier indicating the routing domain of a path element. | <t>An identifier indicating the routing domain of a path element. | |||
Path elements in the same routing domain are in the same administrative domain a | Path elements in the same routing domain are in the same | |||
nd use a common routing protocol to communicate with each other. | administrative domain and use a common routing protocol to | |||
An example of a routing domain identifier is the globally unique autonomous syst | communicate with each other. An example of a routing domain | |||
em number (ASN) as defined in <xref target="RFC1930" format="default"/>.</t> | identifier is the globally unique Autonomous System Number (ASN) as | |||
defined in <xref target="RFC1930" format="default"/>.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Disjointness:</dt> | |||
Disjointness: </dt> | ||||
<dd> | <dd> | |||
<t>For a set of two paths or subpaths, the number of shared path eleme | <t>For a set of two paths or subpaths, the number of shared path | |||
nts can be a measure of intersection (e.g., Jaccard coefficient, which is the nu | elements can be a measure of intersection (e.g., Jaccard | |||
mber of shared elements divided by the total number of elements). Conversely, th | coefficient, which is the number of shared elements divided by the | |||
e number of non-shared path elements can be a measure of disjointness (e.g., 1 - | total number of elements). Conversely, the number of non-shared path | |||
Jaccard coefficient). A multipath protocol might use disjointness as a metric t | elements can be a measure of disjointness (e.g., 1 - Jaccard | |||
o reduce the number of single points of failure. As paths can be defined at diff | coefficient). A multipath protocol might use disjointness as a | |||
erent levels of abstraction, two paths may be disjoint at one level of abstracti | metric to reduce the number of single points of failure. As paths | |||
on, but not on another.</t> | can be defined at different levels of abstraction, two paths may be | |||
disjoint at one level of abstraction but not on another.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Symmetric Path:</dt> | |||
Symmetric Path: </dt> | ||||
<dd> | <dd> | |||
<t>Two paths are symmetric if the path and its reverse path consist of | <t>Two paths are symmetric if the path and its reverse path consist | |||
the same path elements on the same level of abstraction, but in reverse order. | of the same path elements on the same level of abstraction, but in | |||
For example, a path which consists of layer 3 switches and links between them an | reverse order. For example, a path that consists of layer 3 | |||
d a reverse path with the same path elements but in reverse order are considered | switches and links between them and a reverse path with the same | |||
"routing" symmetric, as the same path elements on the same level of abstraction | path elements but in reverse order are considered "routing" | |||
(IP forwarding) are traversed in the opposite direction. | symmetric, as the same path elements on the same level of | |||
Symmetry can depend on the level of abstraction on which the path is defined or | abstraction (IP forwarding) are traversed in the opposite direction. | |||
modeled: If there are two parallel physical links between two nodes, modeling th | Symmetry can depend on the level of abstraction on which the path is | |||
em as separate links may result in a flow using asymmetric paths, and modeling t | defined or modeled. If there are two parallel physical links between | |||
hem as a single virtual link may result in symmetric paths, e.g., if the differe | two nodes, modeling them as separate links may result in a flow | |||
nce between the two physical links is irrelevant in a particular context.</t> | using asymmetric paths, and modeling them as a single virtual link | |||
may result in symmetric paths, e.g., if the difference between the | ||||
two physical links is irrelevant in a particular context.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Path MTU:</dt> | |||
Path MTU: </dt> | ||||
<dd> | <dd> | |||
<t>The maximum size, in octets, of a packet or frame that can be trans | <t>The maximum size, in octets, of a packet or frame that can be | |||
mitted without fragmentation.</t> | transmitted without fragmentation.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Transport Protocols available:</dt> | |||
Transport Protocols available: </dt> | ||||
<dd> | <dd> | |||
<t>Whether a specific transport protocol can be used to establish a co | <t>Whether a specific transport protocol can be used to establish a | |||
nnection over a path or subpath, e.g., whether the path is QUIC-capable or MPTCP | connection over a path or subpath, e.g., whether the path is | |||
-capable, based on input such as policy, cached knowledge, or probing results.</ | QUIC-capable or MPTCP-capable, based on input such as policy, cached | |||
t> | knowledge, or probing results.</t> | |||
</dd> | </dd> | |||
<dt> | <dt>Protocol Features available:</dt> | |||
Protocol Features available: </dt> | ||||
<dd> | <dd> | |||
<t>Whether a specific protocol feature is available over a path or sub | <t>Whether a specific protocol feature is available over a path or | |||
path, e.g., Explicit Congestion Notification (ECN), or TCP Fast Open.</t> | subpath, e.g., Explicit Congestion Notification (ECN) or TCP Fast | |||
Open.</t> | ||||
</dd> | </dd> | |||
</dl> | </dl> | |||
<t>Some path properties express the performance of the transmission of a p | ||||
acket or flow over a link or subpath. | <t>Some path properties express the performance of the transmission of a | |||
Such transmission performance properties can be observed or assessed, e.g., by e | packet or flow over a link or subpath. Such transmission performance | |||
ndpoints or by path elements on the path, or they may be available as cost metri | properties can be observed or assessed, e.g., by endpoints or by path | |||
cs, see <xref target="I-D.ietf-alto-performance-metrics" format="default"/>. | elements on the path, or they may be available as cost metrics, see | |||
Transmission performance properties may be made available in an aggregated form, | <xref target="RFC9439" format="default"/>. Transmission performance | |||
such as averages or minimums. | properties may be made available in an aggregated form, such as averages | |||
Properties related to a path element which constitutes a single layer 2 domain a | or minimums. Properties related to a path element that constitutes a | |||
re abstracted from the used physical and link layer technology, similar to <xref | single layer 2 domain are abstracted from the used physical- and link-laye | |||
target="RFC8175" format="default"/>.</t> | r technology, similar to <xref target="RFC8175" | |||
<dl> | format="default"/>.</t> | |||
<dt> | ||||
Link Capacity: </dt> | <dl spacing="normal" newline="false"> | |||
<dt>Link Capacity:</dt> | ||||
<dd> | <dd> | |||
<t>The link capacity is the maximum data rate at which data that was s | <t>The link capacity is the maximum data rate at which data that was | |||
ent over a link can correctly be received at the node adjacent to the link. | sent over a link can correctly be received at the node adjacent to | |||
This property is analogous to the link capacity defined in <xref target="RFC5136 | the link. This property is analogous to the link capacity defined | |||
" format="default"/> and <xref target="RFC9097" format="default"/> but not restr | in <xref target="RFC5136" format="default"/> and <xref | |||
icted to IP-layer traffic.</t> | target="RFC9097" format="default"/> but is not restricted to IP-layer | |||
traffic.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>Link Usage:</dt> | |||
Link Usage: </dt> | ||||
<dd> | <dd> | |||
<t>The link usage is the actual data rate at which data that was sent | ||||
over a link is correctly received at the node adjacent to the link. | <t>The link usage is the actual data rate at which data that was | |||
This property is analogous to the link usage defined in <xref target="RFC5136" f | sent over a link is correctly received at the node adjacent to the | |||
ormat="default"/> and <xref target="RFC9097" format="default"/> but not restrict | link. This property is analogous to the link usage defined in <xref | |||
ed to IP-layer traffic.</t> | target="RFC5136" format="default"/> and <xref target="RFC9097" | |||
format="default"/> but is not restricted to IP-layer traffic.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>One-Way Delay:</dt> | |||
One-Way Delay: </dt> | ||||
<dd> | <dd> | |||
<t>The one-way delay is the delay between a node sending a packet and | <t>The one-way delay is the delay between a node sending a packet | |||
another node on the same path receiving the packet. | and another node on the same path receiving the packet. This | |||
This property is analogous to the one-way delay defined in <xref target="RFC7679 | property is analogous to the one-way delay defined in <xref | |||
" format="default"/> but not restricted to IP-layer traffic.</t> | target="RFC7679" format="default"/> but is not restricted to IP-layer | |||
traffic.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>One-Way Delay Variation:</dt> | |||
One-Way Delay Variation: </dt> | ||||
<dd> | <dd> | |||
<t>The variation of the one-way delays within a flow. | <t>The variation of the one-way delays within a flow. This property | |||
This property is similar to the one-way delay variation defined in <xref target= | is similar to the one-way delay variation defined in <xref | |||
"RFC3393" format="default"/> but not restricted to IP-layer traffic and defined | target="RFC3393" format="default"/>, but it is not restricted to IP-la | |||
for packets on the same flow instead of packets sent between a source and destin | yer | |||
ation IP address.</t> | traffic and it is defined for packets on the same flow instead of pack | |||
ets | ||||
sent between a source and destination IP address.</t> | ||||
</dd> | </dd> | |||
<dt> | <dt>One-Way Packet Loss:</dt> | |||
One-Way Packet Loss: </dt> | ||||
<dd> | <dd> | |||
<t>Packets sent by a node but not received by another node on the same | <t>Packets sent by a node but not received by another node on the | |||
path after a certain time interval are considered lost. | same path after a certain time interval are considered lost. This | |||
This property is analogous to the one-way loss defined in <xref target="RFC7680" | property is analogous to the one-way loss defined in <xref | |||
format="default"/> but not restricted to IP-layer traffic. | target="RFC7680" format="default"/> but is not restricted to IP-layer | |||
Metrics such as loss patterns <xref target="RFC3357" format="default"/> and loss | traffic. Metrics such as loss patterns <xref target="RFC3357" | |||
episodes <xref target="RFC6534" format="default"/> can be expressed as aggregat | format="default"/> and loss episodes <xref target="RFC6534" | |||
ed properties.</t> | format="default"/> can be expressed as aggregated properties.</t> | |||
</dd> | </dd> | |||
</dl> | </dl> | |||
</section> | </section> | |||
<section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t>If entities are basing policy or path selection decisions on path prope | <t>If entities are basing policy or path-selection decisions on path | |||
rties, they need to rely on the accuracy of path properties that other devices c | properties, they need to rely on the accuracy of path properties that | |||
ommunicate to them. | other devices communicate to them. In order to be able to trust such | |||
In order to be able to trust such path properties, entities may need to establis | path properties, entities may need to establish a trust relationship or | |||
h a trust relationship or be able to independently verify the authenticity, inte | be able to independently verify the authenticity, integrity, and | |||
grity, and correctness of path properties received from another entity.</t> | correctness of path properties received from another entity.</t> | |||
<t>Entities that reveal their target path properties to the network can ne | <t>Entities that reveal their target path properties to the network can | |||
gatively impact their own privacy, e.g., if the target property leaks personal i | negatively impact their own privacy, e.g., if the target property leaks | |||
nformation about a user, such as their identity or which (type of) application i | personal information about a user, such as their identity or which (type | |||
s used. | of) application is used. Such information could then allow network | |||
Such information could then allow network operators to block or re-prioritize tr | operators to block or reprioritize traffic for certain users and/or | |||
affic for certain users and/or application. | applications. Conversely, if privacy-enhancing technologies, e.g., | |||
Conversely, if privacy enhancing technologies, e.g., MASQUE proxies <xref target | MASQUE proxies <xref target="RFC9298" format="default"/>, are used on a | |||
="RFC9298" format="default"/>, are used on a path, the path may only be partiall | path, the path may only be partially visible to any single entity. This | |||
y visible to any single entity. | may diminish the usefulness of path-aware technologies over this | |||
This may diminish the usefulness of path-aware technologies over this path.</t> | path.</t> | |||
<t>The need for, and potential definition of, security and privacy related | <t>The need for, and potential definition of, security- and privacy-relate | |||
path properties, such as confidentiality and integrity protection of payloads, | d path properties, such as confidentiality and integrity | |||
are the subject of ongoing discussion and research, e.g., see <xref target="RFC9 | protection of payloads, are the subject of ongoing discussion and | |||
049" format="default"/> and <xref target="RFC9217" format="default"/>. As the di | research, for example, see <xref target="RFC9049" format="default"/> and < | |||
scussion of such properties is not mature enough, they are out of scope for this | xref | |||
document. | target="RFC9217" format="default"/>. As the discussion of such | |||
One aspect discussed in this context is that security related properties are dif | properties is not mature enough, they are out of scope for this | |||
ficult to characterize since they are only meaningful with respect to a threat m | document. One aspect discussed in this context is that security-related | |||
odel which depends on the use case, application, environment, and other factors. | properties are difficult to characterize since they are only meaningful | |||
Likewise, properties for trust relations between entities cannot be meaningfully | with respect to a threat model that depends on the use case, | |||
defined without a concrete threat model, and defining a threat model is out of | application, environment, and other factors. Likewise, properties for | |||
scope for this document. | trust relations between entities cannot be meaningfully defined without | |||
Properties related to confidentiality, integrity, and trust seem to be orthogona | a concrete threat model, and defining a threat model is out of scope for | |||
l to the path terminology and path properties defined in this document, since th | this document. Properties related to confidentiality, integrity, and | |||
ey are tied to the communicating nodes and the protocols they use (e.g., client | trust seem to be orthogonal to the path terminology and path properties | |||
and server using HTTPS, or client and remote network node using a VPN service) a | defined in this document, since they are tied to the communicating nodes | |||
s well as additional context, such as keying material and who has access to such | and the protocols they use (e.g., client and server using HTTPS, or | |||
a context. In contrast, the path as defined in this document is typically obliv | client and remote network node using a VPN service) as well as | |||
ious to these aspects. | additional context, such as keying material and who has access to such a | |||
Intuitively, the path describes what function the network applies to packets, wh | context. In contrast, the path as defined in this document is typically | |||
ile confidentiality, integrity, and trust describe what function the communicati | oblivious to these aspects. Intuitively, the path describes what | |||
ng parties apply to packets.</t> | function the network applies to packets, while confidentiality, | |||
integrity, and trust describe what function the communicating parties | ||||
apply to packets.</t> | ||||
</section> | </section> | |||
<section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>This document has no IANA actions.</t> | <t>This document has no IANA actions.</t> | |||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<references> | ||||
<name>Informative References</name> | ||||
<reference anchor="I-D.ietf-idr-performance-routing"> | ||||
<front> | ||||
<title>Performance-based BGP Routing Mechanism</title> | ||||
<author fullname="Xiaohu Xu" initials="X." surname="Xu"> | ||||
<organization>Alibaba, Inc</organization> | ||||
</author> | ||||
<author fullname="Shraddha Hegde" initials="S." surname="Hegde"> | ||||
<organization>Juniper</organization> | ||||
</author> | ||||
<author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar" | ||||
> | ||||
<organization>Cisco</organization> | ||||
</author> | ||||
<author fullname="Mohamed Boucadair" initials="M." surname="Boucadair" | ||||
> | ||||
<organization>France Telecom</organization> | ||||
</author> | ||||
<author fullname="Christian Jacquenet" initials="C." surname="Jacquene | ||||
t"> | ||||
<organization>France Telecom</organization> | ||||
</author> | ||||
<date day="22" month="December" year="2020"/> | ||||
<abstract> | ||||
<t> The current BGP specification doesn't use network performance | ||||
metrics | ||||
(e.g., network latency) in the route selection decision process. | ||||
This document describes a performance-based BGP routing mechanism in | ||||
which network latency metric is taken as one of the route selection | ||||
criteria. This routing mechanism is useful for those server | ||||
providers with global reach to deliver low-latency network | ||||
connectivity services to their customers. | ||||
</t> | <displayreference target="I-D.ietf-idr-performance-routing" to="PERFORMANCE-ROUT | |||
</abstract> | ING"/> | |||
</front> | <displayreference target="I-D.ietf-teas-ietf-network-slices" to="NETWORK-SLICES" | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-idr-performance-rout | /> | |||
ing-03"/> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-alto-path-vector"> | ||||
<front> | ||||
<title>An Extension for Application-Layer Traffic Optimization (ALTO): | ||||
Path Vector</title> | ||||
<author fullname="Kai Gao" initials="K." surname="Gao"> | ||||
<organization>Sichuan University</organization> | ||||
</author> | ||||
<author fullname="Young Lee" initials="Y." surname="Lee"> | ||||
<organization>Samsung</organization> | ||||
</author> | ||||
<author fullname="Sabine Randriamasy" initials="S." surname="Randriama | ||||
sy"> | ||||
<organization>Nokia Bell Labs</organization> | ||||
</author> | ||||
<author fullname="Y. Richard Yang" initials="Y. R." surname="Yang"> | ||||
<organization>Yale University</organization> | ||||
</author> | ||||
<author fullname="Jingxuan Zhang" initials="J." surname="Zhang"> | ||||
<organization>Tongji University</organization> | ||||
</author> | ||||
<date day="20" month="March" year="2022"/> | ||||
<abstract> | ||||
<t>This document is an extension to the base Application-Layer Traff | ||||
ic Optimization (ALTO) protocol. It extends the ALTO cost map and ALTO property | ||||
map services so that an application can decide to which endpoint(s) to connect | ||||
based not only on numerical/ordinal cost values but also on fine-grained abstrac | ||||
t information regarding the paths. This is useful for applications whose perfor | ||||
mance is impacted by specific components of a network on the end-to-end paths, e | ||||
.g., they may infer that several paths share common links and prevent traffic bo | ||||
ttlenecks by avoiding such paths. This extension introduces a new abstraction c | ||||
alled the "Abstract Network Element" (ANE) to represent these components and enc | ||||
odes a network path as a vector of ANEs. Thus, it provides a more complete but | ||||
still abstract graph representation of the underlying network(s) for informed tr | ||||
affic optimization among endpoints. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-alto-path-vector-25" | ||||
/> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-alto-performance-metrics"> | ||||
<front> | ||||
<title>ALTO Performance Cost Metrics</title> | ||||
<author fullname="Qin Wu" initials="Q." surname="Wu"> | ||||
<organization>Huawei</organization> | ||||
</author> | ||||
<author fullname="Y. Richard Yang" initials="Y. R." surname="Yang"> | ||||
<organization>Yale University</organization> | ||||
</author> | ||||
<author fullname="Young Lee" initials="Y." surname="Lee"> | ||||
<organization>Samsung</organization> | ||||
</author> | ||||
<author fullname="Dhruv Dhody" initials="D." surname="Dhody"> | ||||
<organization>Huawei</organization> | ||||
</author> | ||||
<author fullname="Sabine Randriamasy" initials="S." surname="Randriama | ||||
sy"> | ||||
<organization>Nokia Bell Labs</organization> | ||||
</author> | ||||
<author fullname="Luis M. Contreras" initials="L. M." surname="Contrer | ||||
as"> | ||||
<organization>Telefonica</organization> | ||||
</author> | ||||
<date day="21" month="March" year="2022"/> | ||||
<abstract> | ||||
<t> The cost metric is a basic concept in Application-Layer Traffi | ||||
c | ||||
Optimization (ALTO), and different applications may use different | ||||
types of cost metrics. Since the ALTO base protocol (RFC 7285) | ||||
defines only a single cost metric (namely, the generic "routingcost" | ||||
metric), if an application wants to issue a cost map or an endpoint | ||||
cost request in order to identify a resource provider that offers | ||||
better performance metrics (e.g., lower delay or loss rate), the base | ||||
protocol does not define the cost metric to be used. | ||||
This document addresses this issue by extending the specification to | <references> | |||
provide a variety of network performance metrics, including network | <name>Informative References</name> | |||
delay, delay variation (a.k.a, jitter), packet loss rate, hop count, | ||||
and bandwidth. | ||||
There are multiple sources (e.g., estimation based on measurements or | <reference anchor="I-D.ietf-idr-performance-routing" target="https://datatracker | |||
service-level agreement) to derive a performance metric. This | .ietf.org/doc/html/draft-ietf-idr-performance-routing-03"> | |||
document introduces an additional "cost-context" field to the ALTO | <front> | |||
"cost-type" field to convey the source of a performance metric. | <title>Performance-based BGP Routing Mechanism</title> | |||
<author initials="X." surname="Xu" fullname="Xiaohu Xu"> | ||||
<organization>Alibaba, Inc</organization> | ||||
</author> | ||||
<author initials="S." surname="Hegde" fullname="Shraddha Hegde"> | ||||
<organization>Juniper</organization> | ||||
</author> | ||||
<author initials="K." surname="Talaulikar" fullname="Ketan Talaulikar"> | ||||
<organization>Cisco</organization> | ||||
</author> | ||||
<author initials="M." surname="Boucadair" fullname="Mohamed Boucadair"> | ||||
<organization>France Telecom</organization> | ||||
</author> | ||||
<author initials="C." surname="Jacquenet" fullname="Christian Jacquenet"> | ||||
<organization>France Telecom</organization> | ||||
</author> | ||||
<date month="December" day="21" year="2020"/> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-idr-performance-routing-03"/ | ||||
> | ||||
</reference> | ||||
</t> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9275.xml" | |||
</abstract> | /> | |||
</front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9439.xml" | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-alto-performance-met | /> | |||
rics-28"/> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-teas-ietf-network-slices"> | ||||
<front> | ||||
<title>A Framework for IETF Network Slices</title> | ||||
<author fullname="Adrian Farrel" initials="A." surname="Farrel"> | ||||
<organization>Old Dog Consulting</organization> | ||||
</author> | ||||
<author fullname="John Drake" initials="J." surname="Drake"> | ||||
<organization>Juniper Networks</organization> | ||||
</author> | ||||
<author fullname="Reza Rokui" initials="R." surname="Rokui"> | ||||
<organization>Ciena</organization> | ||||
</author> | ||||
<author fullname="Shunsuke Homma" initials="S." surname="Homma"> | ||||
<organization>NTT</organization> | ||||
</author> | ||||
<author fullname="Kiran Makhijani" initials="K." surname="Makhijani"> | ||||
<organization>Futurewei</organization> | ||||
</author> | ||||
<author fullname="Luis M. Contreras" initials="L. M." surname="Contrer | ||||
as"> | ||||
<organization>Telefonica</organization> | ||||
</author> | ||||
<author fullname="Jeff Tantsura" initials="J." surname="Tantsura"> | ||||
<organization>Microsoft Inc.</organization> | ||||
</author> | ||||
<date day="21" month="January" year="2023"/> | ||||
<abstract> | ||||
<t> This document describes network slicing in the context of netw | ||||
orks | ||||
built from IETF technologies. It defines the term "IETF Network | ||||
Slice" and establishes the general principles of network slicing in | ||||
the IETF context. | ||||
The document discusses the general framework for requesting and | <reference anchor="I-D.ietf-teas-ietf-network-slices" | |||
operating IETF Network Slices, the characteristics of an IETF Network | target="https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice | |||
Slice, the necessary system components and interfaces, and how | s-22"> | |||
abstract requests can be mapped to more specific technologies. The | <front> | |||
document also discusses related considerations with monitoring and | <title>A Framework for IETF Network Slices</title> | |||
security. | <author initials="A." surname="Farrel" fullname="Adrian Farrel" role="editor"> | |||
<organization>Old Dog Consulting</organization> | ||||
</author> | ||||
<author initials="J." surname="Drake" fullname="John Drake" role="editor"> | ||||
<organization>Juniper Networks</organization> | ||||
</author> | ||||
<author initials="R." surname="Rokui" fullname="Reza Rokui"> | ||||
<organization>Ciena</organization> | ||||
</author> | ||||
<author initials="S." surname="Homma" fullname="Shunsuke Homma"> | ||||
<organization>NTT</organization> | ||||
</author> | ||||
<author initials="K." surname="Makhijani" fullname="Kiran Makhijani"> | ||||
<organization>Futurewei</organization> | ||||
</author> | ||||
<author initials="L. M." surname="Contreras" fullname="Luis M. Contreras"> | ||||
<organization>Telefonica</organization> | ||||
</author> | ||||
<author initials="J." surname="Tantsura" fullname="Jeff Tantsura"> | ||||
<organization>Nvidia</organization> | ||||
</author> | ||||
<date month="August" year="2023"/> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-22" | ||||
/> | ||||
</reference> | ||||
This document also provides definitions of related terms to enable | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1930.xml" | |||
consistent usage in other IETF documents that describe or use aspects | /> | |||
of IETF Network Slices. | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3357.xml" | |||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3393.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5136.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5693.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6534.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7665.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7679.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7680.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8175.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8548.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8558.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8684.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8803.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9097.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9110.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9217.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9298.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1122.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1940.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7676.xml" | ||||
/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9049.xml" | ||||
/> | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-sl | ||||
ices-19"/> | ||||
</reference> | ||||
<reference anchor="RFC1930"> | ||||
<front> | ||||
<title>Guidelines for creation, selection, and registration of an Auto | ||||
nomous System (AS)</title> | ||||
<author fullname="J. Hawkinson" initials="J." surname="Hawkinson"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="T. Bates" initials="T." surname="Bates"> | ||||
<organization/> | ||||
</author> | ||||
<date month="March" year="1996"/> | ||||
<abstract> | ||||
<t>This memo discusses when it is appropriate to register and utiliz | ||||
e an Autonomous System (AS), and lists criteria for such. This document specifi | ||||
es an Internet Best Current Practices for the Internet Community, and requests d | ||||
iscussion and suggestions for improvements.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="6"/> | ||||
<seriesInfo name="RFC" value="1930"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC1930"/> | ||||
</reference> | ||||
<reference anchor="RFC2616"> | ||||
<front> | ||||
<title>Hypertext Transfer Protocol -- HTTP/1.1</title> | ||||
<author fullname="R. Fielding" initials="R." surname="Fielding"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J. Gettys" initials="J." surname="Gettys"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J. Mogul" initials="J." surname="Mogul"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="H. Frystyk" initials="H." surname="Frystyk"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="L. Masinter" initials="L." surname="Masinter"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="P. Leach" initials="P." surname="Leach"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"> | ||||
<organization/> | ||||
</author> | ||||
<date month="June" year="1999"/> | ||||
<abstract> | ||||
<t>HTTP has been in use by the World-Wide Web global information ini | ||||
tiative since 1990. This specification defines the protocol referred to as "HTTP | ||||
/1.1", and is an update to RFC 2068. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2616"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2616"/> | ||||
</reference> | ||||
<reference anchor="RFC3357"> | ||||
<front> | ||||
<title>One-way Loss Pattern Sample Metrics</title> | ||||
<author fullname="R. Koodli" initials="R." surname="Koodli"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Ravikanth" initials="R." surname="Ravikanth"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2002"/> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3357"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3357"/> | ||||
</reference> | ||||
<reference anchor="RFC3393"> | ||||
<front> | ||||
<title>IP Packet Delay Variation Metric for IP Performance Metrics (IP | ||||
PM)</title> | ||||
<author fullname="C. Demichelis" initials="C." surname="Demichelis"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="P. Chimento" initials="P." surname="Chimento"> | ||||
<organization/> | ||||
</author> | ||||
<date month="November" year="2002"/> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3393"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3393"/> | ||||
</reference> | ||||
<reference anchor="RFC4271"> | ||||
<front> | ||||
<title>A Border Gateway Protocol 4 (BGP-4)</title> | ||||
<author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rek | ||||
hter"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="T. Li" initials="T." role="editor" surname="Li"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Hares" initials="S." role="editor" surname="Hares | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<date month="January" year="2006"/> | ||||
<abstract> | ||||
<t>This document discusses the Border Gateway Protocol (BGP), which | ||||
is an inter-Autonomous System routing protocol.</t> | ||||
<t>The primary function of a BGP speaking system is to exchange netw | ||||
ork reachability information with other BGP systems. This network reachability | ||||
information includes information on the list of Autonomous Systems (ASes) that r | ||||
eachability information traverses. This information is sufficient for constructi | ||||
ng a graph of AS connectivity for this reachability from which routing loops may | ||||
be pruned, and, at the AS level, some policy decisions may be enforced.</t> | ||||
<t>BGP-4 provides a set of mechanisms for supporting Classless Inter | ||||
-Domain Routing (CIDR). These mechanisms include support for advertising a set | ||||
of destinations as an IP prefix, and eliminating the concept of network "class" | ||||
within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, | ||||
including aggregation of AS paths.</t> | ||||
<t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4271"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4271"/> | ||||
</reference> | ||||
<reference anchor="RFC5136"> | ||||
<front> | ||||
<title>Defining Network Capacity</title> | ||||
<author fullname="P. Chimento" initials="P." surname="Chimento"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J. Ishac" initials="J." surname="Ishac"> | ||||
<organization/> | ||||
</author> | ||||
<date month="February" year="2008"/> | ||||
<abstract> | ||||
<t>Measuring capacity is a task that sounds simple, but in reality c | ||||
an be quite complex. In addition, the lack of a unified nomenclature on this su | ||||
bject makes it increasingly difficult to properly build, test, and use technique | ||||
s and tools built around these constructs. This document provides definitions f | ||||
or the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling | ||||
between a source and destination in an IP network. By doing so, we hope to pro | ||||
vide a common framework for the discussion and analysis of a diverse set of curr | ||||
ent and future estimation techniques. This memo provides information for the In | ||||
ternet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5136"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5136"/> | ||||
</reference> | ||||
<reference anchor="RFC5693"> | ||||
<front> | ||||
<title>Application-Layer Traffic Optimization (ALTO) Problem Statement | ||||
</title> | ||||
<author fullname="J. Seedorf" initials="J." surname="Seedorf"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="E. Burger" initials="E." surname="Burger"> | ||||
<organization/> | ||||
</author> | ||||
<date month="October" year="2009"/> | ||||
<abstract> | ||||
<t>Distributed applications -- such as file sharing, real-time commu | ||||
nication, and live and on-demand media streaming -- prevalent on the Internet us | ||||
e a significant amount of network resources. Such applications often transfer l | ||||
arge amounts of data through connections established between nodes distributed a | ||||
cross the Internet with little knowledge of the underlying network topology. So | ||||
me applications are so designed that they choose a random subset of peers from a | ||||
larger set with which to exchange data. Absent any topology information guidin | ||||
g such choices, or acting on suboptimal or local information obtained from measu | ||||
rements and statistics, these applications often make less than desirable choice | ||||
s.</t> | ||||
<t>This document discusses issues related to an information-sharing | ||||
service that enables applications to perform better-than-random peer selection. | ||||
This memo provides information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5693"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5693"/> | ||||
</reference> | ||||
<reference anchor="RFC6534"> | ||||
<front> | ||||
<title>Loss Episode Metrics for IP Performance Metrics (IPPM)</title> | ||||
<author fullname="N. Duffield" initials="N." surname="Duffield"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="A. Morton" initials="A." surname="Morton"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J. Sommers" initials="J." surname="Sommers"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2012"/> | ||||
<abstract> | ||||
<t>The IETF has developed a one-way packet loss metric that measures | ||||
the loss rate on a Poisson and Periodic probe streams between two hosts. Howeve | ||||
r, the impact of packet loss on applications is, in general, sensitive not just | ||||
to the average loss rate but also to the way in which packet losses are distribu | ||||
ted in loss episodes (i.e., maximal sets of consecutively lost probe packets). | ||||
This document defines one-way packet loss episode metrics, specifically, the fre | ||||
quency and average duration of loss episodes and a probing methodology under whi | ||||
ch the loss episode metrics are to be measured. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6534"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6534"/> | ||||
</reference> | ||||
<reference anchor="RFC7665"> | ||||
<front> | ||||
<title>Service Function Chaining (SFC) Architecture</title> | ||||
<author fullname="J. Halpern" initials="J." role="editor" surname="Hal | ||||
pern"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="C. Pignataro" initials="C." role="editor" surname="P | ||||
ignataro"> | ||||
<organization/> | ||||
</author> | ||||
<date month="October" year="2015"/> | ||||
<abstract> | ||||
<t>This document describes an architecture for the specification, cr | ||||
eation, and ongoing maintenance of Service Function Chains (SFCs) in a network. | ||||
It includes architectural concepts, principles, and components used in the cons | ||||
truction of composite services through deployment of SFCs, with a focus on those | ||||
to be standardized in the IETF. This document does not propose solutions, prot | ||||
ocols, or extensions to existing protocols.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7665"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7665"/> | ||||
</reference> | ||||
<reference anchor="RFC7679"> | ||||
<front> | ||||
<title>A One-Way Delay Metric for IP Performance Metrics (IPPM)</title | ||||
> | ||||
<author fullname="G. Almes" initials="G." surname="Almes"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Kalidindi" initials="S." surname="Kalidindi"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Zekauskas" initials="M." surname="Zekauskas"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="A. Morton" initials="A." role="editor" surname="Mort | ||||
on"> | ||||
<organization/> | ||||
</author> | ||||
<date month="January" year="2016"/> | ||||
<abstract> | ||||
<t>This memo defines a metric for one-way delay of packets across In | ||||
ternet paths. It builds on notions introduced and discussed in the IP Performan | ||||
ce Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be fami | ||||
liar with that document. This memo makes RFC 2679 obsolete.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="81"/> | ||||
<seriesInfo name="RFC" value="7679"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7679"/> | ||||
</reference> | ||||
<reference anchor="RFC7680"> | ||||
<front> | ||||
<title>A One-Way Loss Metric for IP Performance Metrics (IPPM)</title> | ||||
<author fullname="G. Almes" initials="G." surname="Almes"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Kalidindi" initials="S." surname="Kalidindi"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Zekauskas" initials="M." surname="Zekauskas"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="A. Morton" initials="A." role="editor" surname="Mort | ||||
on"> | ||||
<organization/> | ||||
</author> | ||||
<date month="January" year="2016"/> | ||||
<abstract> | ||||
<t>This memo defines a metric for one-way loss of packets across Int | ||||
ernet paths. It builds on notions introduced and discussed in the IP Performanc | ||||
e Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be famil | ||||
iar with that document. This memo makes RFC 2680 obsolete.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="82"/> | ||||
<seriesInfo name="RFC" value="7680"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7680"/> | ||||
</reference> | ||||
<reference anchor="RFC8175"> | ||||
<front> | ||||
<title>Dynamic Link Exchange Protocol (DLEP)</title> | ||||
<author fullname="S. Ratliff" initials="S." surname="Ratliff"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Jury" initials="S." surname="Jury"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Satterwhite" initials="D." surname="Satterwhite"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Taylor" initials="R." surname="Taylor"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="B. Berry" initials="B." surname="Berry"> | ||||
<organization/> | ||||
</author> | ||||
<date month="June" year="2017"/> | ||||
<abstract> | ||||
<t>When routing devices rely on modems to effect communications over | ||||
wireless links, they need timely and accurate knowledge of the characteristics | ||||
of the link (speed, state, etc.) in order to make routing decisions. In mobile | ||||
or other environments where these characteristics change frequently, manual conf | ||||
igurations or the inference of state through routing or transport protocols does | ||||
not allow the router to make the best decisions. This document introduces a ne | ||||
w protocol called the Dynamic Link Exchange Protocol (DLEP), which provides a bi | ||||
directional, event-driven communication channel between the router and the modem | ||||
to facilitate communication of changing link characteristics.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8175"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8175"/> | ||||
</reference> | ||||
<reference anchor="RFC8547"> | ||||
<front> | ||||
<title>TCP-ENO: Encryption Negotiation Option</title> | ||||
<author fullname="A. Bittau" initials="A." surname="Bittau"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Giffin" initials="D." surname="Giffin"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Handley" initials="M." surname="Handley"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Mazieres" initials="D." surname="Mazieres"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="E. Smith" initials="E." surname="Smith"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2019"/> | ||||
<abstract> | ||||
<t>Despite growing adoption of TLS, a significant fraction of TCP tr | ||||
affic on the Internet remains unencrypted. The persistence of unencrypted traff | ||||
ic can be attributed to at least two factors. First, some legacy protocols lack | ||||
a signaling mechanism (such as a STARTTLS command) by which to convey support fo | ||||
r encryption, thus making incremental deployment impossible. Second, legacy app | ||||
lications themselves cannot always be upgraded and therefore require a way to im | ||||
plement encryption transparently entirely within the transport layer. The TCP E | ||||
ncryption Negotiation Option (TCP-ENO) addresses both of these problems through | ||||
a new TCP option kind providing out-of-band, fully backward-compatible negotiati | ||||
on of encryption.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8547"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8547"/> | ||||
</reference> | ||||
<reference anchor="RFC8548"> | ||||
<front> | ||||
<title>Cryptographic Protection of TCP Streams (tcpcrypt)</title> | ||||
<author fullname="A. Bittau" initials="A." surname="Bittau"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Giffin" initials="D." surname="Giffin"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Handley" initials="M." surname="Handley"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Mazieres" initials="D." surname="Mazieres"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="Q. Slack" initials="Q." surname="Slack"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="E. Smith" initials="E." surname="Smith"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2019"/> | ||||
<abstract> | ||||
<t>This document specifies "tcpcrypt", a TCP encryption protocol des | ||||
igned for use in conjunction with the TCP Encryption Negotiation Option (TCP-ENO | ||||
). Tcpcrypt coexists with middleboxes by tolerating resegmentation, NATs, and o | ||||
ther manipulations of the TCP header. The protocol is self-contained and specif | ||||
ically tailored to TCP implementations, which often reside in kernels or other e | ||||
nvironments in which large external software dependencies can be undesirable. Be | ||||
cause the size of TCP options is limited, the protocol requires one additional o | ||||
ne-way message latency to perform key exchange before application data can be tr | ||||
ansmitted. However, the extra latency can be avoided between two hosts that hav | ||||
e recently established a previous tcpcrypt connection.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8548"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8548"/> | ||||
</reference> | ||||
<reference anchor="RFC8558"> | ||||
<front> | ||||
<title>Transport Protocol Path Signals</title> | ||||
<author fullname="T. Hardie" initials="T." role="editor" surname="Hard | ||||
ie"> | ||||
<organization/> | ||||
</author> | ||||
<date month="April" year="2019"/> | ||||
<abstract> | ||||
<t>This document discusses the nature of signals seen by on-path ele | ||||
ments examining transport protocols, contrasting implicit and explicit signals. | ||||
For example, TCP's state machine uses a series of well-known messages that are | ||||
exchanged in the clear. Because these are visible to network elements on the pa | ||||
th between the two nodes setting up the transport connection, they are often use | ||||
d as signals by those network elements. In transports that do not exchange thes | ||||
e messages in the clear, on-path network elements lack those signals. Often, the | ||||
removal of those signals is intended by those moving the messages to confidenti | ||||
al channels. Where the endpoints desire that network elements along the path re | ||||
ceive these signals, this document recommends explicit signals be used.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8558"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8558"/> | ||||
</reference> | ||||
<reference anchor="RFC8684"> | ||||
<front> | ||||
<title>TCP Extensions for Multipath Operation with Multiple Addresses< | ||||
/title> | ||||
<author fullname="A. Ford" initials="A." surname="Ford"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="C. Raiciu" initials="C." surname="Raiciu"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Handley" initials="M." surname="Handley"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="O. Bonaventure" initials="O." surname="Bonaventure"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="C. Paasch" initials="C." surname="Paasch"> | ||||
<organization/> | ||||
</author> | ||||
<date month="March" year="2020"/> | ||||
<abstract> | ||||
<t>TCP/IP communication is currently restricted to a single path per | ||||
connection, yet multiple paths often exist between peers. The simultaneous use | ||||
of these multiple paths for a TCP/IP session would improve resource usage within | ||||
the network and thus improve user experience through higher throughput and impr | ||||
oved resilience to network failure.</t> | ||||
<t>Multipath TCP provides the ability to simultaneously use multiple | ||||
paths between peers. This document presents a set of extensions to traditional | ||||
TCP to support multipath operation. The protocol offers the same type of service | ||||
to applications as TCP (i.e., a reliable bytestream), and it provides the compo | ||||
nents necessary to establish and use multiple TCP flows across potentially disjo | ||||
int paths.</t> | ||||
<t>This document specifies v1 of Multipath TCP, obsoleting v0 as spe | ||||
cified in RFC 6824, through clarifications and modifications primarily driven by | ||||
deployment experience.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8684"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8684"/> | ||||
</reference> | ||||
<reference anchor="RFC8803"> | ||||
<front> | ||||
<title>0-RTT TCP Convert Protocol</title> | ||||
<author fullname="O. Bonaventure" initials="O." role="editor" surname= | ||||
"Bonaventure"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Boucadair" initials="M." role="editor" surname="B | ||||
oucadair"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Gundavelli" initials="S." surname="Gundavelli"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Seo" initials="S." surname="Seo"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="B. Hesmans" initials="B." surname="Hesmans"> | ||||
<organization/> | ||||
</author> | ||||
<date month="July" year="2020"/> | ||||
<abstract> | ||||
<t>This document specifies an application proxy, called Transport Co | ||||
nverter, to assist the deployment of TCP extensions such as Multipath TCP. A Tra | ||||
nsport Converter may provide conversion service for one or more TCP extensions. | ||||
The conversion service is provided by means of the 0-RTT TCP Convert Protocol (C | ||||
onvert).</t> | ||||
<t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion se | ||||
rvice since no extra delay is induced by the protocol compared to connections th | ||||
at are not proxied. Also, the Convert Protocol does not require any encapsulatio | ||||
n (no tunnels whatsoever).</t> | ||||
<t>This specification assumes an explicit model, where the Transport | ||||
Converter is explicitly configured on hosts. As a sample applicability use case | ||||
, this document specifies how the Convert Protocol applies for Multipath TCP.</t | ||||
> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8803"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8803"/> | ||||
</reference> | ||||
<reference anchor="RFC9000"> | ||||
<front> | ||||
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title> | ||||
<author fullname="J. Iyengar" initials="J." role="editor" surname="Iye | ||||
ngar"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Thomson" initials="M." role="editor" surname="Tho | ||||
mson"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2021"/> | ||||
<abstract> | ||||
<t>This document defines the core of the QUIC transport protocol. Q | ||||
UIC provides applications with flow-controlled streams for structured communicat | ||||
ion, low-latency connection establishment, and network path migration. QUIC incl | ||||
udes security measures that ensure confidentiality, integrity, and availability | ||||
in a range of deployment circumstances. Accompanying documents describe the int | ||||
egration of TLS for key negotiation, loss detection, and an exemplary congestion | ||||
control algorithm.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9000"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9000"/> | ||||
</reference> | ||||
<reference anchor="RFC9097"> | ||||
<front> | ||||
<title>Metrics and Methods for One-Way IP Capacity</title> | ||||
<author fullname="A. Morton" initials="A." surname="Morton"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Geib" initials="R." surname="Geib"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="L. Ciavattone" initials="L." surname="Ciavattone"> | ||||
<organization/> | ||||
</author> | ||||
<date month="November" year="2021"/> | ||||
<abstract> | ||||
<t>This memo revisits the problem of Network Capacity Metrics first | ||||
examined in RFC 5136. This memo specifies a more practical Maximum IP-Layer Capa | ||||
city Metric definition catering to measurement and outlines the corresponding Me | ||||
thods of Measurement.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9097"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9097"/> | ||||
</reference> | ||||
<reference anchor="RFC9217"> | ||||
<front> | ||||
<title>Current Open Questions in Path-Aware Networking</title> | ||||
<author fullname="B. Trammell" initials="B." surname="Trammell"> | ||||
<organization/> | ||||
</author> | ||||
<date month="March" year="2022"/> | ||||
<abstract> | ||||
<t>In contrast to the present Internet architecture, a path-aware in | ||||
ternetworking architecture has two important properties: it exposes the properti | ||||
es of available Internet paths to endpoints, and it provides for endpoints and a | ||||
pplications to use these properties to select paths through the Internet for the | ||||
ir traffic. While this property of "path awareness" already exists in many Inter | ||||
net-connected networks within single domains and via administrative interfaces t | ||||
o the network layer, a fully path-aware internetwork expands these concepts acro | ||||
ss layers and across the Internet.</t> | ||||
<t>This document poses questions in path-aware networking, open as o | ||||
f 2021, that must be answered in the design, development, and deployment of path | ||||
-aware internetworks. It was originally written to frame discussions in the Path | ||||
Aware Networking Research Group (PANRG), and has been published to snapshot cur | ||||
rent thinking in this space.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9217"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9217"/> | ||||
</reference> | ||||
<reference anchor="RFC9298"> | ||||
<front> | ||||
<title>Proxying UDP in HTTP</title> | ||||
<author fullname="D. Schinazi" initials="D." surname="Schinazi"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2022"/> | ||||
<abstract> | ||||
<t>This document describes how to proxy UDP in HTTP, similar to how | ||||
the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this doc | ||||
ument defines a protocol that allows an HTTP client to create a tunnel for UDP c | ||||
ommunications through an HTTP server that acts as a proxy.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9298"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9298"/> | ||||
</reference> | ||||
<reference anchor="RFC1122"> | ||||
<front> | ||||
<title>Requirements for Internet Hosts - Communication Layers</title> | ||||
<author fullname="R. Braden" initials="R." role="editor" surname="Brad | ||||
en"> | ||||
<organization/> | ||||
</author> | ||||
<date month="October" year="1989"/> | ||||
<abstract> | ||||
<t>This RFC is an official specification for the Internet community. | ||||
It incorporates by reference, amends, corrects, and supplements the primary pr | ||||
otocol standards documents relating to hosts. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="3"/> | ||||
<seriesInfo name="RFC" value="1122"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC1122"/> | ||||
</reference> | ||||
<reference anchor="RFC1940"> | ||||
<front> | ||||
<title>Source Demand Routing: Packet Format and Forwarding Specificati | ||||
on (Version 1)</title> | ||||
<author fullname="D. Estrin" initials="D." surname="Estrin"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="T. Li" initials="T." surname="Li"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="Y. Rekhter" initials="Y." surname="Rekhter"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="K. Varadhan" initials="K." surname="Varadhan"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Zappala" initials="D." surname="Zappala"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="1996"/> | ||||
<abstract> | ||||
<t>The purpose of SDRP is to support source-initiated selection of r | ||||
outes to complement the route selection provided by existing routing protocols f | ||||
or both inter-domain and intra-domain routes. This memo provides information fo | ||||
r the Internet community. This memo does not specify an Internet standard of an | ||||
y kind.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="1940"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC1940"/> | ||||
</reference> | ||||
<reference anchor="RFC2784"> | ||||
<front> | ||||
<title>Generic Routing Encapsulation (GRE)</title> | ||||
<author fullname="D. Farinacci" initials="D." surname="Farinacci"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="T. Li" initials="T." surname="Li"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Hanks" initials="S." surname="Hanks"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Meyer" initials="D." surname="Meyer"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="P. Traina" initials="P." surname="Traina"> | ||||
<organization/> | ||||
</author> | ||||
<date month="March" year="2000"/> | ||||
<abstract> | ||||
<t>This document specifies a protocol for encapsulation of an arbitr | ||||
ary network layer protocol over another arbitrary network layer protocol. [STAND | ||||
ARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2784"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2784"/> | ||||
</reference> | ||||
<reference anchor="RFC7676"> | ||||
<front> | ||||
<title>IPv6 Support for Generic Routing Encapsulation (GRE)</title> | ||||
<author fullname="C. Pignataro" initials="C." surname="Pignataro"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Bonica" initials="R." surname="Bonica"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Krishnan" initials="S." surname="Krishnan"> | ||||
<organization/> | ||||
</author> | ||||
<date month="October" year="2015"/> | ||||
<abstract> | ||||
<t>Generic Routing Encapsulation (GRE) can be used to carry any netw | ||||
ork- layer payload protocol over any network-layer delivery protocol. Currently, | ||||
GRE procedures are specified for IPv4, used as either the payload or delivery p | ||||
rotocol. However, GRE procedures are not specified for IPv6.</t> | ||||
<t>This document specifies GRE procedures for IPv6, used as either t | ||||
he payload or delivery protocol.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7676"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7676"/> | ||||
</reference> | ||||
<reference anchor="RFC9049"> | ||||
<front> | ||||
<title>Path Aware Networking: Obstacles to Deployment (A Bestiary of R | ||||
oads Not Taken)</title> | ||||
<author fullname="S. Dawkins" initials="S." role="editor" surname="Daw | ||||
kins"> | ||||
<organization/> | ||||
</author> | ||||
<date month="June" year="2021"/> | ||||
<abstract> | ||||
<t>This document is a product of the Path Aware Networking Research | ||||
Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to | ||||
catalog and analyze past efforts to develop and deploy Path Aware techniques, mo | ||||
st of which were unsuccessful or at most partially successful, in order to extra | ||||
ct insights and lessons for Path Aware networking researchers.</t> | ||||
<t>This document contains that catalog and analysis.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9049"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9049"/> | ||||
</reference> | ||||
</references> | </references> | |||
<section numbered="false" anchor="acknowledgments" toc="default"> | <section numbered="false" anchor="acknowledgments" toc="default"> | |||
<name>Acknowledgments</name> | <name>Acknowledgments</name> | |||
<t>Thanks to the Path-Aware Networking Research Group for the discussion a | <t>Thanks to the Path Aware Networking Research Group for the discussion | |||
nd feedback. Specifically, thanks to Mohamed Boucadair for the detailed review, | and feedback. Specifically, thanks to <contact fullname="Mohamed | |||
various text suggestions, and shepherding, thanks to Brian Trammell for suggesti | Boucadair"/> for the detailed review, various text suggestions, and | |||
ng the flow definition, and thanks to Luis M. Contreras, Spencer Dawkins, Paul H | shepherding; thanks to <contact fullname="Brian Trammell"/> for | |||
offman, Jake Holland, Colin Perkins, Adrian Perrig, and Matthias Rost for the re | suggesting the flow definition; and thanks to <contact fullname="Luis | |||
views, comments, and suggestions. Many thanks to Dave Oran for his careful IRSG | M. Contreras"/>, <contact fullname="Spencer Dawkins"/>, <contact | |||
review.</t> | fullname="Paul Hoffman"/>, <contact fullname="Jake Holland"/>, <contact | |||
fullname="Colin Perkins"/>, <contact fullname="Adrian Perrig"/>, and | ||||
<contact fullname="Matthias Rost"/> for the reviews, comments, and | ||||
suggestions. Many thanks to <contact fullname="Dave Oran"/> for his | ||||
careful IRSG review.</t> | ||||
</section> | </section> | |||
</back> | </back> | |||
<!-- ##markdown-source: | ||||
H4sIAKElBmQAA61963LbSJbmfz4FwhMbI0WQbNlVvnZszKhs2a2Zkq2xVN2x | ||||
OzGxkSSSJMogwAJAyewKv808xvzrF5vznUtmAqDsqt6pHy7xgrycPPfzneRs | ||||
Npt0RVf6V9l59ud66Rb70jWHrF5l167bZNdNvfNNV/h24haLxt+9Gr2f18vK | ||||
bWmAvHGrblY03Wq2c1Wzpn+7zWwXvjk7ezHJXedfTZb077puDq+yolrVk0mx | ||||
a15lXbNvuydnZy/Pnkxc492r7PLj7dvJfd18Wjf1fkczn7//+G7yyR/ovZw+ | ||||
rjrfVL6bvcHEk0nbuSr/f66sK1rMgVa2K15l/97Vy2nW1k3X+FVLfx22+OM/ | ||||
JhO37zZ182qSzSYZ/VdU7avs4zy7qNYb1+Qdvykb++h96/sf1M3aVcVfXVfU | ||||
1avsve9WZfGZP/FbV5S0MXrrnzuvz8xpmb2JXs+zf23+9p8bXy3+9l+bMpns | ||||
9aEpynL8aX/Gi9s/Zf/3b//VFMtNOuuSH55/apzHw3u/Kf+ZSDz33eavc/rq | ||||
BPRutjTIHR0DP3k5ezPHYmdF3szopPjzaulnRPOuqNbDr7myq+Vk7/yyAwGP | ||||
fZ6Ms/UdLbMdfq/zrp3xX0QbHPKsLYult+99fPv68cvvzuKrJ88eP4uvvvvu | ||||
6fP01cvv4qvvnzx/HF89ffxd8tzTZ+k3nz397vv46vmzZ0/TV89fpq9eJGt5 | ||||
8fh58s0XT79/3nv1In31NH317EUy34sXZ8laXp6dnaWvXiZjvnzyuPfqJcac | ||||
zWaZW7Rd45bE/Lebos1IFPdbX3UZ/e0ykrx8v+wgy93Gi9ye35NogV9BcTpd | ||||
4u3Wu2a5yd5BxrITlrHT+YS/HWU38593jW/bLDBQXdHsxCIZeIGmWzZ1i1n1 | ||||
NDOSRZ629c0dzhWD3RW5z7O7wmXtnqbkJ+eTywqLBUc5Xp2OMOX30jVs3SFb | ||||
+Gy1L0vSUA19Tu87vHB3xP5uUfqsqzMiQMHf50kcrb3Kd3VRdTRXn0y5XxUV | ||||
fRFrVZ1U/BVL7U88n7zdN7SXZls3fsq7ipTOMd2Kp/N3vnHlaNn3G5LSbFus | ||||
Nx2Wv2897UAWquvCZmpMENY+nfj5ej7NiNg0bkmShsNaEGW8r5Tk9BE+Lqq7 | ||||
mo+yrbfeDjsQ28g/F4bZFnle+snkH6A9hT/oJME+PlvumwZbMr2agS+Kjube | ||||
N9gxbaWqO3ACCSrZjAMReLcjzRo2kuVFu6yJCmxAaHF0njmWJgvuNsRj6w0v | ||||
0Nikoh0wQdMnE+LhaAILubatlwUdVJ7dFx0PRIpZ2eh6xEE08xTnL8ecE6Wy | ||||
G88bzh7PH2OiX39V6fryZUpfa5dNsSDD8ej4hpSwtjQsVPflDzhWPo5lvd3u | ||||
q2KpIqJiUdHkQlVhbWwrTELGTlZFPKFbirN0G0cnsVrRwttMdTIe/wPNRdbU | ||||
kd10VbvyzaMhdysPQCjXvvKkhIUSBc+lq0+molXlOYQcM2Cvq6Jpg/r4Ze9b | ||||
PAgVcERa8UxCTWK3c1o7iQwt2pd8ZLQ7odfG3XniZWJkIpoeZV7QFpn9tp7s | ||||
XLXmeeK78AiY5OnZ8gIhkA9sG2cBstIyiqou6/UBixB2kLWokiEJw7OtHMyq | ||||
rO/befaDw+rwPJ8Jb2Yg/aZARgqD5Kl6cGEsqP6z2+5KYSPwzpJma5mDxtqn | ||||
qKDlBnOXRds9rHSYbVRhqsZZqajhaTpI2luYd54x62BI2A7wapXLkS1wxIUo | ||||
p88bRz4a+Q4stsZMd55O+33deZm0v+mgNkh26R1l5yrIE6akiYbLB2eRUOzH | ||||
2h3PspY8YNGRLzHgpr6P2n/pqiC+fKz0gjyRxb7zo+kKmCB2QIm3us0huyfK | ||||
0TZg32hcGmTnlX7J5uZDs9t4GEkwEu9tSdLiq3bf/n0mmJT0beTcyeSCd/1q | ||||
Ald9tzm0pGNKGIE7crmJUHQe0JJsFvYVK5QpXkAMylL1Hi1Evtam3yO2FiO1 | ||||
K90BgtPUROyB3I7lfWU2eImgwRyBIECT80pPis+CGKmu2HNkc7da8d+vsg+V | ||||
KFZ6AfGzR8C7MnhBH3kcUWJQWD3RLNOsmPs5lh/ZnchS0rJZOdKGKh/26Uqw | ||||
zYRmlBU8ODF5OeXek/dKbLtjzavcZfOCOXQ5Pv/KIogFyMyWx9YxDf4Js8WN | ||||
D2fU0Au2eGSK72qxJCk1bXV6BkYTWyotbd+q5PCRHVP14l4sSA4XbF7peZqX | ||||
dG+7b5TAW7xD3yiJO6vw3qqpt0StxF05sPjnnjmzCoesi1XGamriuZZV5fKT | ||||
78IKSEByetH4pSdF0k5tQy3z7rbOxbfC1HPi+4rmMRIfkQEb1cUPhd3xlroR | ||||
4RSik+TA8yZGagt4flKu0AywiCWrmr1nc8X6oqW/lpveqlzZssaM3CTbhyZg | ||||
dU1H8dvkUfch49AZnu+7uqq3NSmTmwOpzG12cn4DJfFjUX0SnbD1ebHnQ+v7 | ||||
ICu3LMBwontpKRWzCYmxkBhCXcMusSEmX2Qjzih2VtLotAQoX3busVHSBzg1 | ||||
O0m8Fm7gUea8otZE3s4hnsxfitnbIvh/gT6yKHrofAlOya7ZNcJcnVOaHDtn | ||||
OzU5jOFw2KN9Y0sbY2O9qdnkiGHPWoq6I7fol8LWIUtVkdMJqODSJxJYkPCk | ||||
7w9orrsn/vWlMBiWUjJlzIsPswv1iadqcqdb8rizMDD89uvEQ8FJX4g11tNg | ||||
DY+B59lbcKy4FVMNqew5WxDoqzGjmaDsQr9ycv7+4nTgL//664OBPzt5WJtw | ||||
X+t/EY0JFs9/dkt2eVLnKmNLLCfklHtsXezEbouugzalE2/MzYWXjD+ZN2XL | ||||
c0TC12JsiHf75yNxZ7H1s9zv4MRAkkU9g2o+ECK7cw3t6xDdeNZs5BcFLlct | ||||
Nw2xrBivuAuTACwj2QGrguXGVWtaawZrjecS31vXAHeEzuEkLA+nR2+kpOxT | ||||
sEGep2oD65zi+Mu6Jj8uGYXpZ8ST3ciD4Tli3n0XtxTGT1hzy7u442Qgdgya | ||||
njLp4XUFT8eZGlN+w6xF1w7DdjkMkznzCqAVc2/2hgcAwdQjwFEQEXPZ1GBG | ||||
HpSjgyzf98N+Ci8k5uTsAMl/WyxEAY7oSUK7awoOeHT94iMXTfoYHyVbSCNE | ||||
ukoWxt+xzo4imc6C4rgU1yXRTkmGpxRrodLKLkB2VMTVHK4LNlYtW7qEgUy1 | ||||
iZYxVhZVpIpSD6BVVTQdDEHuZzKCeS3975zfiAkjzr7QBEH2sYav/WHxsweX | ||||
X3z8cMo6vK7Kg1lE4Rw4LmTnlxQZ7Rs4XfDW4dZXQkSRNtLFn6r6vtKoBFHz | ||||
hqMCFlw2bvI8cynZw31J3qPDJOTHNLXL+UXru46jx3vWB0ETFQimiPbwiUwJ | ||||
YCHqmuT4gIck2hud4Pxr1qD/uWZooqoQ/k4nmvI0fIJwpNnuEj8ubNOIO1T5 | ||||
xWXgFeb+Y5r7oACEQyyOq4U4FOv8zAY0UeeLA6/ijX5UwcqmfiE8Uu9J5Vto | ||||
yhr+QrMU0PK3LLshaRWFHvrvuOKpo5M9NFBVzIAEpQzbPDJB/4Rk8OMnT5Ck | ||||
UQNv31+WBZsucwdE2e2rSkT63i9w8vfk+p2KpYQTSIfytQfkK9B1HxFctxK3 | ||||
2f55w8xs7GcLXR0ULCJgHk4VLXx//5lZ/CuuAk1zs1/sdIZ3IsQWlJCw8UeS | ||||
0P0tJnYlIaqo0slbClUw7IeKHYWEPYPrFtmT9EzRO1bOPUoALMsIKVi3IxGX | ||||
43FJVAOGbf3IEeGACUeWCn1ZhlWw2AW3+vb1Nb3Ttiz4muUTP2lFxJl1e2wg | ||||
GCryqsAz4h0W3TenOer1sftEzozKgTg0TA6MUVfeeOcBu6xxdnhCt8yrJ2OA | ||||
sIy95G8ONEcApZSTgdgLNQEFG3AGx30utuTqc4jbOMu8mFvB+2RTpYp+PCzz | ||||
6XBYl2/JQ4G94RxPXqvP4MRV4GcWvqyRnOvq8aBhvIdJ0ONonnO9bvzaiUPu | ||||
Z/fsK5Qu5Id4lIXn/Db29ZCTptpGdg0NK9NQ2DzY5n6gsunYmKMgrbTd1Bex | ||||
YzlpT6dxMWLk/HZHI0I8ihXN3XMFG3ruzmGxmnGLCpbp6Hp5elmbKqTRyZ5G | ||||
7/POUdT/0IOP3y12LXTWeSTorsfP/agzqAIetR0cIOnkOsa9/BVax3JZa/al | ||||
TsQesVJ40BRzcqo4kp5djNpKfdbAFKcW12GHV7c/pSZGOZ9OCPSxD8tSPZk6 | ||||
zSIN55SjCbPhGHtTIXJ2VWBApL2q5WGoP1Kdo/Yf3gzmWtSYNh3QVUnifM/8 | ||||
y3zdJsKB+kAZHDPIle6W88eBiBzDW85CCVztt0jox0hYtoCc0nZqVJqaQqQH | ||||
1Iezrz/qGuKlQjYo4cveP0rfhxMKd+np2f/CkpVNkq+KHLhmUZDCoCghLFHr | ||||
XW7XxjMoqh0FHDoISy1yq+E94tsPnIcacW3gLDO5tX1vJarUXMeUs6bGUNNM | ||||
8+m27z37+pLmMpXbs1YaePQVUW8a9uHSaO/rKskyATJlzoURmLfhTisY1aYm | ||||
8Yc+p6NCUtXygY4f4ShduSoogyi1rJDdcHAi/bLc55JDg2oqXIyG2E15aCrJ | ||||
r9NeVGWkz0o8F8XOljA5FqCEpSysouIe3q1Ei6KgNSaG8UBU/aCUDi28zqsu | ||||
hZQbP8PzJyWPbC1TxDQ9vbdCFZfMMYddEsKiWnfH6R6iQDUL8pYehWSK2867 | ||||
3KisJvcTkWpT13k0noEGm7rMkdW5dc3ad0MeqDlYgvU1foeJEVaP5pUrGt/g | ||||
+HlSkiEb158tugoyeD0QPk4RW6DXEwfJHHCek9P/g4oTjYtIBLl+G1LDDo35 | ||||
NfoSh5MXFSdiGrbKbUsaFu6HaMdwqCiL9OoiJNJuLcWZIKSdX274U+CTWJem | ||||
JcAktuiGqIlB5YvrpppUYp93GUAGn4s25KhWey6RJ1WSdAXzyU9aUi3adCEm | ||||
H8NH5HS0SsnQBM2THFd2EtMPK1pMsPB9YexhOuEtowcAm5IEebICkcJQJ03m | ||||
arPLa65DU2RkWpUoqZG7FahPNGp7+f3Zly+nJEUlqt/sV6KQWYjwhI0Nghis | ||||
PUmGuINvTFsFcMJ5Ck44SYNEifTaUaI9JIjAoV0hh5wSCfNEbkSq9MZSGh8/ | ||||
zCcXCM1i9l98o6MHOI2DxqxfqxAQywaxBuWsUj9cLKoYkx0kw9nCbozMVIzE | ||||
A7ZExgnRJQ3OwdGRiFQDvqplAIdunZM4ViXoLGH40BB61qxxwn5VSgJS4Mi0 | ||||
yVdkYi51/kRx9utQAx+ADLNf/4GIMONa9ZfJ5C8bfxwzBGNRt+OC/DfRNpJN | ||||
CRwC5kRxnEU2hTyBY4jvPMKjwKDrmvShoi9a5bd+df4bBf5h9bzQknmVltwx | ||||
IsNZpEzDoJTK36dSy4qgqbuaGH9KQ0Do49TYFEkY6VyJKfDwcYjVEgAFi2Lm | ||||
k6u68bA5AkdCAT6p+qZc36MfZ6P6yVdVZlwRZSMWafhNjTbtq0KpT1bfzpne | ||||
Isu3YuCWG9KLDTgEitU/k1u1ulEtLYI/tFhOafY11lF1C8PVL/VK3TRmVdS2 | ||||
cHWNa+iMlYNreSLO7p6MandqsIQY4dQtkbkMmBY2V72CdjJ6rG0znITkto1e | ||||
OwagcBffIxIoDDCWpg2BR84sz1estKoCGUyhKK1imSTRkuZyT4LJYPqyB7ut | ||||
iUe8ARgk6UNB1n0BHmzFKjcrtwQXINTSym1M20ti+ehqkrlbi6X3fdwMUEBh | ||||
wLBoKxfrgs+j1pr9yBbptnErqLwPu67YKjI3Ozn/8fbDqUChADZFzlK83b7O | ||||
y3beNzOGyvomCC3Csfoey4jayiHw7PDljatmpLJzCjf4qdbOheL+ixT2YmBN | ||||
qWSwT9OlqisxetBdcNHkjQNToOcrFqq0ZCwll5AkBYhEwK+kDZf7hpEBAoQS | ||||
lghOZykOvbDcgg6IfHvfJT7hEahCWjeicWSQXhZckAmIZwNeKAAlE4oc2Z/y | ||||
agpdpb0dzDLb+yyaPC0HL7sGUESDHw4cegzL9NF8iY2REqo77BBS0ESkoaDT | ||||
6q874h/IEf8LSeAbccTt5bWEpD+SEhAGRwGebClFRXwEgTU6mE3dgVBmkUDc | ||||
6HSHUYJlnsZBpZnyAaXZhMmBuk7TyinrN/6XfWGBN3s0AgROYefGVGNG4Nh8 | ||||
mCbgGInkj21RncA8RAkX5GPR5DTTyc2Pl6df2dLXx4mBGY1DAg6RuLy4fRsO | ||||
VtDracH8IYQ7yirnrZgbyZ6yPQnSnHEG1sOgCvxXi0BZuwV3cxg2Q6adsXfI | ||||
LzWHIYDJ+DQGwnh+A19vwEUkhKWETw2A+v5O5ipB/mxVwNlUb/3ImBtyPHvs | ||||
ZqGH5eVILi4Fjo6IMdiplSZRZcEsV90RudS6XwgrT6SKUh5OjQ+m6Zn1T0zy | ||||
BuqJ0qFdtP/fpzZwwQtRaWBw3YRovYd5ODo24bSTgMN0P7CVRRteGgOIR8B+ | ||||
UyJtgH+XxAZBo+uyWe1J8MzOL219yS4/26xdjRKtlGxJ7nLVU5wsoLPzMLio | ||||
jMcn1rWPCO7EgKzoSO7pGTrp1+KJ+7zV8LlznxAyRbUTseBB80SBHvl7R9x4 | ||||
LPAeJp7U+V1R71uivKXWmEk1+7Dx5Q6YV2CV6aNCpjaEO0OtQsg+gptbb0Ii | ||||
khi6RJ4HjlEVsgQr2uyC1C8wGDtUb4jLDWiivhLRL/ezerWKCeThpOph9ARz | ||||
rMhPDTWe+Ng9X67tTWalM1Lry00tLQABSHxkd+QHA3uyckWDyvCA2YvE24wI | ||||
27pSigJqSD7KdsduhhnzkUXBQ/u252WZIJJ15gxCK2Vx0Qz/2Nrax7vF7LkG | ||||
1knyn/s9SPJJk9EXOfukcrMaoxbP2bsiTiRdFdOVkS6uREdIt9lCde5LcqqL | ||||
LUcCdfDKsp/rBZLl2HM/r3U0duHCH5NryeD0IHgc5Tf/2PZMJFjJVeqnrxwd | ||||
QHCawedRpgwJUke8vsBUxIGPO1IXLGcaC45M83P9tAEUB+IAQYD2o+V+XpWP | ||||
79XkPJzkSYAunt+cioLMf94DWN61QwJL/wqnhkpx0/RvyyMFNTGKmS+r7Id3 | ||||
11oqAmtmF5/JUrwpkDrewuOHzb+6eHMK1lTct5XsCyOqBD+zrWNAs6JUE0cv | ||||
RkV4k5gRUCu3rfnM8LeCjQI/n99k1+e3fyJlUa0VDkUstGYcg/amffnyRymc | ||||
j/MX05BP5q6AkDXUZBPtxopxciSJXJkV6ekM0JTf+ImTpEth4lzkhj1PaQ9g | ||||
vUYagKIglIpo/oUrnSCMkbBInNbEVD7QMciwEcS6FtQk8e4PHIoHk8ZlTk1n | ||||
95KbD/kzVd/1thkY81qtijXrdHt35xo6EiQq+9m2cYPFQ7gUTlJS1MTQlg6V | ||||
IVgzhV+KuilZu6gA49j+7afL19oKc3Z29uWL1BNWGSyDdNQkqlIBWHrW/OhC | ||||
SLSikUUClp/SolLYHZvVBMAVa9+ysLUrgBrPAHEGirbxbsu6IvHHBagoTE2x | ||||
K2cqXXmqz/yyZ6B6L0rQGJJ9/gg/sM4SUisdaoFLVUS9c1bFQO7KfutnC1Zk | ||||
ZIjJVZrxIPwQI2ZPhYHGKPgJNwsq/1pjQlYnVEn8qj4H6TY5AXJXf/KJGETc | ||||
9ZGMpS3irZU3X28UJsBnjKbRiEvqWynuB9DqbuNTKzWqk53NPt7eIqOgCdnX | ||||
dUXHCfvCs6BVlDjpHp3BC28+Xx7ViIDqmCVke4JtiKz8R1EQRSClDGY+TcK/ | ||||
V9dA4Mi0z158T9PSUumtolrqu0+/f07v2t8v6O8l6RtO86nXTszB02FITWZq | ||||
r6D2f6YmbdAniE4HNTgaHhWSyxdOT+GAgG/WzJuJeyKc3iq8j2F18hbp6jaB | ||||
Guq59kJShrSkwg8Lkfe4RnGWo2YC5W7OqS9r7OZUDoVjOCRU48JAH96iMAbI | ||||
Yw0SWi8DlnEwA2fJL5KusXGOPAD3tDHJuh2x5CNtZ0M/NPJwaBqz7IshWWI2 | ||||
OYJo2LbF9Dy0/1+ih5CI0lcyx/1Ewgg9zJnVCbfyRpAv5KDlyofAVZD0bI7l | ||||
OX9HlvkbtoBnZTomiW2evT+yBFIi8xRL1/dHU8LiFZbEwbGQlheke/cBbJu4 | ||||
WmI7Vv4+21CsYXi3Y5n2ry1oRYR39xJf/MEy1wjjSd6OrTFNv5UKqpMyUeMY | ||||
HJlr4SOZvw/4Xjl0C0QHhXVg0rpjfiPa8yx/KHV/tAYqSo5789TM89JAIsmv | ||||
kdreFLt+W0U4tB5yP8K5GBbWgyaYY6y1YRn6ThkpHMoA9fctSCD6iJHjpf89 | ||||
si6EdGSXoEkVii6Siex3kgEGZwcwlrazMDCwj9/emr8/7pm3WUkf5YeKHIFl | ||||
erBHAC+Kc4lYwpGDxumFanZkOANnVdkFlByqtbxa0S8C/+buCK6tNRYToU4O | ||||
ncPA5AC1V+kduHDoxdOZe7i19hWX+wHW6Ky2gPNwTVEeYq7BHo08YGxbMARy | ||||
k62B0kec1soqOP0RxGFScFKrl8/qZScjqq4f1XMQga2zN0ADtyQFQfVy3QJJ | ||||
OvbkNPLrD5ByeQJjyiK7p27PJwkOQ5HneMdh6r0sndQ9+6NLOofc+1ya79nP | ||||
kMb1jSKLhrFU0qNr9TcEwMDRMF3GRyAMi/wRywZn1Wg5avK5W9wYPelfDCg5 | ||||
a1BMAgS5JoJHUkKQXvfsvAW7Lc4PZ0mEJTH3XS3FoLpdkpekOO3LSrWP9JwP | ||||
T1vxumDeY3s7aJWelNyhjxCFgaCZOcwqanZmwBmyR/r0/fltUirA8wEP0+u9 | ||||
zfLQuknytvLMt9pwGHwncR3F10pBU73gAakR6cK7DTY64N8T1c1SLeWspKrK | ||||
8SRLhIHkNIyMLQwRAFmPkOk9OPTlSno+hOCjRY17X6pgvGR1RLhgXelzbj6c | ||||
0v+QLzTtxLrstS9LkJLm7Hq9nGlfzQhgpLsVM0/z2VTfvbu+zpY6JI//4uzJ | ||||
/PFjmvltMc8+SCg36O1SnlB33Mlmh+VqxZmJe5BW4MSBTE/WAo6jJxbzzmnz | ||||
gAuLJqaJeYl5liIU4FezV28XLJAAAjYuWDzTiaoCQ9d8xAhOrixOfE0hX2Cs | ||||
Bt6uaJqdKyQsUQ6K3NMrXjITjW6eCU0NX+UtRbKj/WLgaFs/48DBVyRdOoj2 | ||||
QbQKiOZ+dGmhCZHhvOeyB94cjt6Gg7V8OnkQ1qB5LtdySHioMMkT0gqaEUa4 | ||||
dp1kaC6qjaZuroGwxO0ONxJ/EK8gKT6aPPICjToNKlj1W0xuSed7JTX42KOa | ||||
aGNB6sMEKYXQ/FJ3m+iEmUfWaG+N6hsJfckAVktWNQrxkT4F2ZxItxzGuYgc | ||||
L+itwuq59aZVVJNr1G69HfUgsP9+siUOnJ2m2J4rBRAMJj2HA2i9pCXz+NV8 | ||||
csUe4yoGC1mAqyZuq4uJiZMNhdpoQ9KYnd0rdRs4Rqq6wRPyAJL1B6TkWIuA | ||||
loMY5dx810VZLz/15B9C40IHGTfTsyE86aeSTnWqVrCjPBvwTMmRDBua99oz | ||||
GaRjZU4Eaj6toDkB737LU19JIpQR39r3oULFFSJNQUtz7+WK8arizriSdFcL | ||||
p+i+jWBahY7jjiFLL/ADtLATqWP4/BSjXkVYyPAhOCNdMMEBxR4dt6upFMxT | ||||
3jL4UQCIJszGNzQEbKTmWvtfCSqNczyDg44REgn0H356c81IW95bfwSaIzxR | ||||
gNGQWE+SKAuPpHTdDEHa8TmEP6ZnhKrslGsuk9a/rjEQFEt0HVqWb+MxPEmT | ||||
11v74s3/eR8YDw5Zk7MrJNUIcq9odr1e6IiQXiabrXm4sNJQs1JHiLXwUmOZ | ||||
cD8ERhdVyJQz+gzwDSZnxjP9RWg9hIaShFc6Ug9NnfbBCII4gDxDS6Hcv2PL | ||||
M8JA9vlpVtShuy2EekkxuLe6P93eXoNfPh+GF1qxqcHdeAI0ym1+vlenis2j | ||||
bmlIFADeuD1XYDHyd1usicxtYr5wcx2PqQmqlPVTpkdDeKoohJOiXYxtx3q6 | ||||
jAuYyh4liJXivqinpNwg1wRJsn05KPRpR84BvO/L1aCJQyW+r1ZD860DFtmi | ||||
mHCJi0W57/SqrI9agbqolm7XWnfCybuPF6dZtyehKLUz9clzJEnl7+fPnvNB | ||||
9HHlRjpWi1qSh0mtVx0XfwyDbRqOIeLS1edtrkErsREEjyu5fP5HhraJNezS | ||||
M0muHkhOposd33D4+81/b7j5z3wzueXOQJxpRkSAHOnllFkAEDd12QY3th76 | ||||
TieMbUlurzLPDGi21Gc61pWoN0SRwn13zXeDacFxGrt84eHoDS8hyYSeXj1X | ||||
2WB2aff3NdqBES70aww7ZDGV1SS1LzL2punC572bOkItgT2nwbNy6vHj452X | ||||
EBpE4+EiMxslWI6uTuq2fnSBy2TYoTlYRrpX4cl1WS84zKQhf6GY1sVrZ1q5 | ||||
dqbabxdooD6/eT++LERv7eQccNpnDtq+1ZPpLMEVwHnWXax+nEyA6tHGNQYM | ||||
iVc2WOu35ifwRS4hG/JaE/H/QoxHgk308cCvFNwkEyoHRycKczB3x9aVru6Q | ||||
kA1fj4yqdZrW2+1s8UvIjf3mDeRpT751dGazY5tAM4WGNJpdEFaQ7ALYpTcY | ||||
q1m5ghXcQsvZK34i2b62MoS2/pUrSloZ33XTg27aYX/7soppcsQapMc7CToO | ||||
zY6nm80P4PS4svHk5rDVPYRW/DA6J83C50W8byDcRZKGGmlzeBC/UftJ+OTh | ||||
NRZVGJfsOVZ5rPVtfP2TpEu+0wuL1DSOLgbaqi3vLb3fDT+IZo8siUmT2O1H | ||||
Kv6PIr2mlpH/O+iQnZCrFP3OU7sGR8oCpt/GdxrN7Tit0Sm9GuboRHXVu0VD | ||||
useNF+WaMEQlr5Au6gICXBiwwUVsZb/X/2gvLw8Ss4hIjOHpzu5K2XLerkXF | ||||
sgixp8ZBkf8SBP5owOM5/P64o5G0MCTcakK39L1EMO+0v0F0kTQhpVQM0oVa | ||||
lLN6wdXtT2bprQG9Lf7qGaVfUzDF5YxVL2xdAVqRpdcOpC2x4FQ0KdC31lu7 | ||||
CydE+Qh+DBzSxtKfhv2Kroi5tnHApDMacMWT+7QokbXvpTrTNsloZYyihuNI | ||||
WQr4ixnXskvOHHEp3N6YxmhCQltz1RlLSfqfgSI55yuJGdFlI8CEBXhATriV | ||||
WyZkF2+9Awbx2xQI+17JE+zEhoLp17cZLuN5jRyz3JRJoQzGVY/24vV7aZ9A | ||||
2PUWLd8fSCBpoRPOGg3z8ymSvof6T3rKtkVrbZw9nuGcryyXWT8ul3QCqNl7 | ||||
Oh09WYDdJWnJ99CzjKvDQiKq1+21OBxXbaGQ1aHVzvpkAmVdq5gUucHcgqNv | ||||
XnUO9+f2N+xEJ9y6PJ21kPboeIMCHk0CQ3jMa0XuSp8/Lj8edB1Yc2PP447G | ||||
iHz5fecTjSRW6Unqn5oCtg53Lf/nUdOY5RqVAHqobIkmHz9/yl5hD55mSkfD | ||||
QMWsPXjJibMtyL3HjAV2ba9GaQElstcCFZfqp17hlN5kEm7Q0Xy7XAJzm6aq | ||||
WdAoLq7XcICT78XFDt1fXDevmC/FgL0EWMa8GhIdvvRNzufyeqakE5C10YfR | ||||
ej3iSJNzEXJnfN/r7yYMZ7CMLv/zRJFF/k9TpFf/NKL0K9aFlSDTCqkmQmL7 | ||||
hCoiqZGml8ZUAw8o1qlisuG3EKG/qCEd8IMCf/e+sz87VDS1OgEK3Nkbpnl7 | ||||
s7exURla98jqEwkdrz0OPtwFfmrhN+9CL3KTEaTztVeZSosKAfbaq0vGw3zg | ||||
ariYVkxIlnREgVzXvREPxhlxD/GCt68zhlt1LEx2NwFXWO2qiKG3XZLp+D1c | ||||
U6KKNWaaF2e/g2muxAAFY8Fj7oA3barWDvDpcxVH/tTvipZTUvwpfhGD8Xxs | ||||
Y9XW6w25o4uFpHd5AqCmNL7AyeDtCyxnglx+QGyBPORBcf6CPSa7qSLBgxuI | ||||
oD0C052KlbbiVNqgR1HynkxVvOBx2DIih2o37aYpEzmELVf3JWiSxL6hyAR4 | ||||
FFtCeo2JaSuGrSt1RuXhFKbE3kiKUUsrS6SpkQHlHe1Re8Dl17g1Ciy2bvhP | ||||
aSRgHV5pfn2448DPx69qTtoBXccBoys1P26NC+Pm+S5pgwRzVAy54By8No7I | ||||
CLiecdcUdw4OcS90GfYWlt5RmEJ/twzBHf+uiOOOiGmKG0Mza8hEWjr0BCV+ | ||||
osNpD9msSH/1K9PRpTDDpR0ueIR9YWGOoWpgARQ6pII2ow2hDYQioqDY+Jce | ||||
VAtgma3h6ZI1zCdpdqhYGWHoKKxAm14TYvS6Or/5t58uONsP4v+7/uLLf0zD | ||||
XRDxNpRpDF/Ag5x75/K5/TAKo/Lixfnq7RkvsHLqwZ7UyQsorFXapJCudowY | ||||
ud1I8xdoI3y6q5F+L7gJO/ndiWlolNMLC4Qq5reOxMwYwC7qwYj2cJAMDpLi | ||||
XR9WxZzGuyn3cg8pX+gn9S38OsBePHQpksg9/PFqcq8p/pdn378MLsw/xR+5 | ||||
QH5MwvIwEF+WuOz/uIBUm7YSu/kKHXSqzBgi+o3fGMDdjXK1u82T3F0TLg1R | ||||
cQ6UDdTs/6YCEgjIAXSKRGMHHz96o6XEuKpKOutQQgJmYHyRX7cBRE6yHOZ+ | ||||
9guOBhaeplIBtXlXNHUl1xZxXZgVlOJEcX/4J39f4LFhC3pfnQbnwCe979r/ | ||||
F1deRk/MshKcJVg2nisscRPT6K6Iw9jb4W/4NYjjQdiAbUfaXC2M91uD2TW0 | ||||
zDVrRdW8ghJNrjA6duPPQ9caTYdHa1ffdEe7vuIVwbuQounsB240Na23rtpv | ||||
89DhSR4MZUopwSTfsJtRww/+5D7AB/58/d5qNVxMuPdo32/T3gzl8KgGPnnG | ||||
MODisKbQKPR+UzO6Pxab5Nsh0ZWNwHvWLPi126Ai6q4mk879prFwpj+3AM+h | ||||
2xd2s1EYOvyakLSBJDCi5KKBWIwLP4sg3QG/jWnCPWnjKfoHywYBR2utyjqd | ||||
uG+X5+/PR65b/5dNNly5lG+6cDO9/KYUOpQwzPnSUl+cZJn8+kpKDD7/349W | ||||
rmz9I+5LcEhPKvsh+zj71g+iGLh2oK6t93ae3WiizH4kx2a4qjfkuufZD/V+ | ||||
6XJXNHEoT5a7ZJz3XeHvpxzw8OnyPXH7tabKNJPbbvyOVFTOtx3F8X9ocB/d | ||||
beO2W/AtN3roo8lPlPTRASxbNsCPe6LxFVeRuoZIT9PRXkhYm+yNuyda0BvX | ||||
jrTvn+rVaovrHf/FffL0qiz5vvHX5EdXwH7JV89zXhC9boq1zHVFvv+moMP7 | ||||
iESWbV923U6ZS3z43aNk33N6sjokS32DHoMPjWKepPW9YTTZ5cebdzrifPLf | ||||
JgQA1VByAAA= | ||||
</rfc> | </rfc> | |||
End of changes. 85 change blocks. | ||||
1631 lines changed or deleted | 644 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |