<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-mpls-mna-usecases-15" number="9791" consensus="true" updates="" obsoletes="" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" xml:lang="en" prepTime="2025-07-10T10:23:39" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-mpls-mna-usecases-15" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9791" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="MNA Use Cases">Use Cases for MPLS Network Action Indicators and Ancillary Data</title>
    <seriesInfo name="RFC" value="9791" stream="IETF"/>
    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization showOnFrontPage="true">Cisco Systems, Inc.</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization showOnFrontPage="true">Independent</organization>
      <address>
        <email>kiran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Song" fullname="Haoyu Song">
      <organization showOnFrontPage="true">Futurewei Technologies</organization>
      <address>
        <email>haoyu.song@futurewei.com</email>
      </address>
    </author>
    <author initials="G." surname="Mirsky" fullname="Greg Mirsky">
      <organization showOnFrontPage="true">Ericsson</organization>
      <address>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>
    <date month="07" year="2025"/>
    <area>RTG</area>
    <workgroup>mpls</workgroup>
    <keyword>Special Purpose Label</keyword>
    <keyword>MPLS data plane</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
  This document presents use cases that have a common feature
  that may be addressed by encoding network action indicators
  and associated ancillary data within MPLS packets. There is community
  interest in extending the MPLS data plane to carry such indicators
  and ancillary data to address these use cases.
      </t>
      <t indent="0" pn="section-abstract-2">
   The use cases described in this document are not an exhaustive set
   but rather the ones that have been actively discussed by members of the
   IETF MPLS, PALS, and DetNet Working Groups from the beginning of work
   on  MPLS Network Action (MNA) until the publication of this document.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by the
            Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9791" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2025 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-abbreviations">Abbreviations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-cases">Use Cases</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-no-further-fast-reroute">No Further Fast Reroute</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-applicability-of-hybrid-mea">Applicability of Hybrid Measurement Methods</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.2.2">
                  <li pn="section-toc.1-1.2.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.2.2.1.1"><xref derivedContent="2.2.1" format="counter" sectionFormat="of" target="section-2.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-in-situ-oam">In Situ OAM</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.2.2.2.1"><xref derivedContent="2.2.2" format="counter" sectionFormat="of" target="section-2.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-alternate-marking-method">Alternate Marking Method</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-network-slicing">Network Slicing</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.4">
                <t indent="0" pn="section-toc.1-1.2.2.4.1"><xref derivedContent="2.4" format="counter" sectionFormat="of" target="section-2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-nsh-based-service-function-">NSH-Based Service Function Chaining</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.5">
                <t indent="0" pn="section-toc.1-1.2.2.5.1"><xref derivedContent="2.5" format="counter" sectionFormat="of" target="section-2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-network-programming">Network Programming</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-coexistence-with-the-existi">Coexistence with the Existing MPLS Services Using Post-Stack Headers</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-coexistence-of-the-mna-use-">Coexistence of the MNA Use Cases</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-cases-for-continued-dis">Use Cases for Continued Discussion</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="A.1" format="counter" sectionFormat="of" target="section-appendix.a.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-generic-delivery-functions">Generic Delivery Functions</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="A.2" format="counter" sectionFormat="of" target="section-appendix.a.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-delay-budgets-for-time-boun">Delay Budgets for Time-Bound Applications</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.3">
                <t indent="0" pn="section-toc.1-1.8.2.3.1"><xref derivedContent="A.3" format="counter" sectionFormat="of" target="section-appendix.a.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-stack-based-methods-for-lat">Stack-Based Methods for Latency Control</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.d"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">This document describes use cases that introduce functions that require
special processing by forwarding hardware. The current state of the art requires
allocating a new Special-Purpose Label (SPL) <xref target="RFC3032" format="default" sectionFormat="of" derivedContent="RFC3032"/> or Extended Special-Purpose Label (eSPL).
SPLs are a very limited resource, while eSPL requires an extra label stack entry per network action, which is expensive.
Therefore, an MPLS Network Action (MNA) <xref target="RFC9613" format="default" sectionFormat="of" derivedContent="RFC9613"/> approach was proposed to extend the MPLS architecture.
MNA is expected to enable functions that may require carrying additional
ancillary data within the MPLS packets, as well as a means to indicate that the
ancillary data is present and a specific action needs to be performed on the
packet.</t>
      <t indent="0" pn="section-1-2">
This document lists various use cases that could benefit extensively
from the MNA framework <xref target="RFC9789" format="default" sectionFormat="of" derivedContent="RFC9789"/>.
Supporting a solution of the general MNA framework provides
a common foundation for future network actions that can be exercised
in the MPLS data plane.
</t>
      <section anchor="terminology" numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-terminology">Terminology</name>
        <t indent="0" pn="section-1.1-1">The following terminology is used in the document:</t>
        <dl newline="true" spacing="normal" indent="3" pn="section-1.1-2">
          <dt pn="section-1.1-2.1">RFC 9543 Network Slice:</dt>
          <dd pn="section-1.1-2.2">Interpreted as defined in <xref target="RFC9543" format="default" sectionFormat="of" derivedContent="RFC9543"/>.
          This document uses "network slice" interchangeably as a
          shorter version of the term "RFC 9543 Network Slice".</dd>
          <dt pn="section-1.1-2.3">MPLS Ancillary Data (also referred to in this document as "ancillary data"):</dt>
          <dd pn="section-1.1-2.4">
            <t indent="0" pn="section-1.1-2.4.1">Data that can be classified as:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-1.1-2.4.2">
              <li pn="section-1.1-2.4.2.1">residing within the MPLS label stack (referred to as "in-stack data"), and</li>
              <li pn="section-1.1-2.4.2.2">residing after the Bottom of Stack (BoS) (referred to as "post-stack data").</li>
            </ul>
          </dd>
        </dl>
      </section>
      <section anchor="acronyms-and-abbreviations" numbered="true" removeInRFC="false" toc="include" pn="section-1.2">
        <name slugifiedName="name-abbreviations">Abbreviations</name>
        <dl spacing="normal" newline="false" indent="3" pn="section-1.2-1">
          <dt pn="section-1.2-1.1">AMM:</dt>
          <dd pn="section-1.2-1.2">Alternative Marking Method</dd>
          <dt pn="section-1.2-1.3">BoS:</dt>
          <dd pn="section-1.2-1.4">Bottom of Stack</dd>
          <dt pn="section-1.2-1.5">DEX:</dt>
          <dd pn="section-1.2-1.6">Direct Export</dd>
          <dt pn="section-1.2-1.7">eSPL:</dt>
          <dd pn="section-1.2-1.8">extended Special-Purpose Label</dd>
          <dt pn="section-1.2-1.9">FRR:</dt>
          <dd pn="section-1.2-1.10">Fast Reroute</dd>
          <dt pn="section-1.2-1.11">G-ACh:</dt>
          <dd pn="section-1.2-1.12">Generic Associated Channel</dd>
          <dt pn="section-1.2-1.13">HbH:</dt>
          <dd pn="section-1.2-1.14">Hop by Hop</dd>
          <dt pn="section-1.2-1.15">I2E:</dt>
          <dd pn="section-1.2-1.16">Ingress to Egress</dd>
          <dt pn="section-1.2-1.17">IOAM:</dt>
          <dd pn="section-1.2-1.18">In situ Operations, Administration, and Maintenance</dd>
          <dt pn="section-1.2-1.19">LSP:</dt>
          <dd pn="section-1.2-1.20">Label Switched Path</dd>
          <dt pn="section-1.2-1.21">LSR:</dt>
          <dd pn="section-1.2-1.22">Label Switching Router</dd>
          <dt pn="section-1.2-1.23">MNA:</dt>
          <dd pn="section-1.2-1.24">MPLS Network Action</dd>
          <dt pn="section-1.2-1.25">NRP:</dt>
          <dd pn="section-1.2-1.26">Network Resource Partition</dd>
          <dt pn="section-1.2-1.27">NSH:</dt>
          <dd pn="section-1.2-1.28">Network Service Header</dd>
          <dt pn="section-1.2-1.29">PW:</dt>
          <dd pn="section-1.2-1.30">Pseudowire</dd>
          <dt pn="section-1.2-1.31">SPL:</dt>
          <dd pn="section-1.2-1.32">Special-Purpose Label</dd>
          <dt pn="section-1.2-1.33">ToS:</dt>
          <dd pn="section-1.2-1.34">Top of Stack</dd>
        </dl>
      </section>
    </section>
    <section anchor="use-cases" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-use-cases">Use Cases</name>
      <section anchor="no-further-fastreroute" numbered="true" removeInRFC="false" toc="include" pn="section-2.1">
        <name slugifiedName="name-no-further-fast-reroute">No Further Fast Reroute</name>
        <t indent="0" pn="section-2.1-1">MPLS Fast Reroute <xref target="RFC4090" format="default" sectionFormat="of" derivedContent="RFC4090"/> <xref target="RFC5286" format="default" sectionFormat="of" derivedContent="RFC5286"/> <xref target="RFC7490" format="default" sectionFormat="of" derivedContent="RFC7490"/>
          <xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa" format="default" sectionFormat="of" derivedContent="SR-TI-LFA"/> is a useful
and widely deployed tool for minimizing packet loss in the case of a link or
node failure.</t>
        <t indent="0" pn="section-2.1-2">Several cases exist where, once a Fast Reroute (FRR) has taken place in an MPLS network and
a packet is rerouted away from the failure, a second FRR impacts
the same packet on another node and may result in traffic disruption.</t>
        <t indent="0" pn="section-2.1-3">
In such a case, the packet impacted by multiple FRR events may continue to loop
between the Label Switching Routers (LSRs) that activated FRR until the packet's TTL
expires. That can lead to link congestion and further packet loss. 
To avoid that situation, packets that FRR has redirected will be marked using MNA to preclude further FRR processing.
</t>
      </section>
      <section anchor="hybrid-pmm-sec" numbered="true" removeInRFC="false" toc="include" pn="section-2.2">
        <name slugifiedName="name-applicability-of-hybrid-mea">Applicability of Hybrid Measurement Methods</name>
        <t indent="0" pn="section-2.2-1">MNA can be used to carry information essential for collecting operational information
and measuring various performance metrics that reflect the experience of the packet marked by MNA.
Optionally, the operational state and telemetry information collected on
the LSR may be transported using MNA techniques.</t>
        <section anchor="in-situ-oam" numbered="true" removeInRFC="false" toc="include" pn="section-2.2.1">
          <name slugifiedName="name-in-situ-oam">In Situ OAM</name>
          <t indent="0" pn="section-2.2.1-1">In situ Operations, Administration, and Maintenance (IOAM),
defined in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> and <xref target="RFC9326" format="default" sectionFormat="of" derivedContent="RFC9326"/>, might be used to collect
operational and telemetry information while a packet traverses a particular path
in a network domain.</t>
          <t indent="0" pn="section-2.2.1-2">IOAM can run in two modes: Ingress to Egress (I2E) and Hop by Hop (HbH).  In I2E
mode, only the encapsulating and decapsulating nodes will process IOAM data
fields. In HbH mode, the encapsulating and decapsulating nodes
and intermediate IOAM-capable nodes process IOAM data fields. The IOAM data fields,
defined in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/>, can be used to derive the operational state of the network
experienced by the packet with the IOAM Header that traversed the path through the IOAM domain.</t>
          <t indent="0" pn="section-2.2.1-3">Several IOAM Option-Types have been defined:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.2.1-4">
            <li pn="section-2.2.1-4.1">
              <t indent="0" pn="section-2.2.1-4.1.1">Pre-allocated Trace</t>
            </li>
            <li pn="section-2.2.1-4.2">
              <t indent="0" pn="section-2.2.1-4.2.1">Incremental Trace</t>
            </li>
            <li pn="section-2.2.1-4.3">
              <t indent="0" pn="section-2.2.1-4.3.1">Edge-to-Edge</t>
            </li>
            <li pn="section-2.2.1-4.4">
              <t indent="0" pn="section-2.2.1-4.4.1">Proof-of-Transit</t>
            </li>
            <li pn="section-2.2.1-4.5">
              <t indent="0" pn="section-2.2.1-4.5.1">Direct Export (DEX)</t>
            </li>
          </ul>
          <t indent="0" pn="section-2.2.1-5">
With all IOAM Option-Types except for Direct Export (DEX), the collected
information is transported in the trigger IOAM packet.
In the IOAM DEX Option-Type <xref target="RFC9326" format="default" sectionFormat="of" derivedContent="RFC9326"/>, the operational state and telemetry information are
collected according to a specified profile and exported in a manner and
format defined by a local policy. In IOAM DEX, the user data packet is only
used to trigger the IOAM data to be directly exported or locally aggregated
without being carried in the IOAM trigger packets.</t>
        </section>
        <section anchor="ater-mark-sec" numbered="true" removeInRFC="false" toc="include" pn="section-2.2.2">
          <name slugifiedName="name-alternate-marking-method">Alternate Marking Method</name>
          <t indent="0" pn="section-2.2.2-1">
The Alternate Marking Method (AMM), defined in <xref target="RFC9341" format="default" sectionFormat="of" derivedContent="RFC9341"/> and <xref target="RFC9342" format="default" sectionFormat="of" derivedContent="RFC9342"/>), is an example
of a hybrid performance measurement method <xref target="RFC7799" format="default" sectionFormat="of" derivedContent="RFC7799"/> that can be used in the MPLS network
to measure packet loss and packet delay performance metrics. <xref target="RFC8957" format="default" sectionFormat="of" derivedContent="RFC8957"/> defines
the Synonymous Flow Label framework to realize AMM in the MPLS network.
The MNA is an alternative mechanism that can be used to support AMM in the MPLS network.
</t>
        </section>
      </section>
      <section anchor="network-slicing" numbered="true" removeInRFC="false" toc="include" pn="section-2.3">
        <name slugifiedName="name-network-slicing">Network Slicing</name>
        <t indent="0" pn="section-2.3-1">An RFC 9543 Network Slice Service <xref target="RFC9543" format="default" sectionFormat="of" derivedContent="RFC9543"/>
provides connectivity coupled with network resource commitments and is expressed in terms of one or more
connectivity constructs. <xref target="I-D.ietf-teas-ns-ip-mpls" sectionFormat="of" section="5" format="default" derivedLink="https://datatracker.ietf.org/doc/html/draft-ietf-teas-ns-ip-mpls-05#section-5" derivedContent="NS-IP-MPLS"/> defines a Network Resource Partition (NRP) Policy
as a policy construct that enables the instantiation of mechanisms to support one or more network slice services.
The packets associated with an NRP may carry a
marking in their network-layer header to identify this association, which is referred to as an NRP Selector. The NRP Selector maps
a packet to the associated network resources and provides the
corresponding forwarding treatment onto the packet.</t>
        <t indent="0" pn="section-2.3-2">A router that requires the forwarding of a packet that belongs to an NRP
may have to decide on the forwarding action to take based on selected
next hop(s) and decide on the forwarding treatment (e.g., scheduling and drop policy) to
enforce based on the associated  per-hop behavior.</t>
        <t indent="0" pn="section-2.3-3">In this case, routers that forward traffic over a physical link shared by multiple
NRPs need to identify the NRP to which the packet belongs to enforce their respective forwarding actions and treatments.</t>
        <t indent="0" pn="section-2.3-4">MNA technologies can signal actions for MPLS packets
and carry data essential for these actions. For example, MNA can carry the NRP Selector <xref target="I-D.ietf-teas-ns-ip-mpls" format="default" sectionFormat="of" derivedContent="NS-IP-MPLS"/> in MPLS packets.</t>
      </section>
      <section anchor="nsh-based-service-function-chaining" numbered="true" removeInRFC="false" toc="include" pn="section-2.4">
        <name slugifiedName="name-nsh-based-service-function-">NSH-Based Service Function Chaining</name>
        <t indent="0" pn="section-2.4-1"><xref target="RFC8595" format="default" sectionFormat="of" derivedContent="RFC8595"/> describes how Service Function Chaining can be realized in
an MPLS network by emulating the Network Service Header (NSH) <xref target="RFC8300" format="default" sectionFormat="of" derivedContent="RFC8300"/> using only MPLS label stack entries.</t>
        <t indent="0" pn="section-2.4-2">The approach in <xref target="RFC8595" format="default" sectionFormat="of" derivedContent="RFC8595"/> introduces some limitations, which are discussed in
<xref target="I-D.lm-mpls-sfc-path-verification" format="default" sectionFormat="of" derivedContent="SFP-VERIF"/>. However, the approach can benefit
from the MNA framework introduced in <xref target="RFC9789" format="default" sectionFormat="of" derivedContent="RFC9789"/>.</t>
        <t indent="0" pn="section-2.4-3">MNA can be used to extend NSH emulation using MPLS
labels <xref target="RFC8595" format="default" sectionFormat="of" derivedContent="RFC8595"/> to support the functionality of NSH Context Headers,
whether fixed or variable length. For example, MNA could support Flow ID
<xref target="RFC9263" format="default" sectionFormat="of" derivedContent="RFC9263"/> that may be used for load-balancing among
Service Function Forwarders and/or the Service Functions
within the same Service Function Path.</t>
      </section>
      <section anchor="network-programming" numbered="true" removeInRFC="false" toc="include" pn="section-2.5">
        <name slugifiedName="name-network-programming">Network Programming</name>
        <t indent="0" pn="section-2.5-1">In Segment Routing (SR), an ingress node steers a packet through an ordered list of instructions
called "segments".  Each of these instructions represents a
function to be called at a specific location in the network.  A
function is locally defined on the node where it is executed and may
range from simply moving forward in the segment list to any complex
user-defined behavior.</t>
        <t indent="0" pn="section-2.5-2">Network Programming combines SR functions to achieve a
networking objective beyond mere packet routing.</t>
        <t indent="0" pn="section-2.5-3">Encoding a pointer to a function and its arguments within an MPLS packet transport header may be desirable.
MNA can be used to encode the FUNC::ARGs to support the functional
equivalent of FUNC::ARG in Segment Routing over IPv6 as described in <xref target="RFC8986" format="default" sectionFormat="of" derivedContent="RFC8986"/>.</t>
      </section>
    </section>
    <section anchor="existing-mpls-use-cases" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-coexistence-with-the-existi">Coexistence with the Existing MPLS Services Using Post-Stack Headers</name>
      <t indent="0" pn="section-3-1">Several services can be transported over MPLS networks today.
These include providing Layer 3 (L3) connectivity (e.g., for unicast and
multicast L3 services) and Layer 2 (L2) connectivity (e.g., for unicast
PWs, multicast E-Tree, and broadcast Ethernet LAN (E-LAN) L2 services). In
those cases, the user service traffic is encapsulated as the payload in MPLS packets.</t>
      <t indent="0" pn="section-3-2">For L2 service traffic, it is possible to use a Control Word (CW) <xref target="RFC4385" format="default" sectionFormat="of" derivedContent="RFC4385"/>
        <xref target="RFC5085" format="default" sectionFormat="of" derivedContent="RFC5085"/> immediately after the MPLS header to disambiguate the type of MPLS payload,
prevent possible packet misordering, and allow for fragmentation.  In this case,
the first nibble of the data that immediately follows the MPLS BoS is
set to 0b0000 to identify the presence of the PW CW.</t>
      <t indent="0" pn="section-3-3">In addition to providing connectivity to user traffic, MPLS may also transport OAM
data (e.g., over  MPLS Generic Associated Channels (G-AChs) <xref target="RFC5586" format="default" sectionFormat="of" derivedContent="RFC5586"/>). In this case, the first nibble of
the data that immediately follows the MPLS BoS is set to 0b0001. It
indicates the presence of a control channel associated with a PW, LSP, or section.</t>
      <t indent="0" pn="section-3-4">Bit Index Explicit Replication (BIER) <xref target="RFC8296" format="default" sectionFormat="of" derivedContent="RFC8296"/> traffic can also be encapsulated
over MPLS. In this case, BIER has defined 0b0101 as the value for the first nibble
of the data that immediately appears after the BoS for any
BIER-encapsulated packet over MPLS.</t>
      <t indent="0" pn="section-3-5">For PWs, the G-ACh <xref target="RFC7212" format="default" sectionFormat="of" derivedContent="RFC7212"/> uses the first four bits of the PW control word
to provide the initial discrimination between data packets and
packets belonging to the associated channel, as described in
<xref target="RFC4385" format="default" sectionFormat="of" derivedContent="RFC4385"/>.</t>
      <t indent="0" pn="section-3-6">MPLS can be used as the data plane for Deterministic Networking (DetNet) <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/>.
The DetNet sub-layers, forwarding, and service
are realized using the MPLS label stack, the DetNet control word  <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>,
and the DetNet Associated Channel Header <xref target="RFC9546" format="default" sectionFormat="of" derivedContent="RFC9546"/>.</t>
      <t indent="0" pn="section-3-7">MNA-based solutions for the use cases described in this document and proposed
in the future are expected to allow for coexistence and backward compatibility with all existing MPLS services.</t>
    </section>
    <section anchor="co-existence-of-usecases" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-coexistence-of-the-mna-use-">Coexistence of the MNA Use Cases</name>
      <t indent="0" pn="section-4-1">Two or more of the discussed cases may coexist in the same packet.
That may require the presence of multiple ancillary data
(whether in-stack or post-stack ancillary data) to be present in the same MPLS packet.</t>
      <t indent="0" pn="section-4-2">For example, IOAM may provide essential functions along with network slicing to help
ensure that critical network slice Service Level Objectives (SLOs) are being met by the network provider.
In this case, IOAM can collect key performance measurement parameters of a
network slice traffic flow as it traverses the transport network.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1">This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1"><xref target="RFC9789" sectionFormat="of" section="7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9789#section-7" derivedContent="RFC9789"/> 
outlines security considerations for documents that do not specify protocols.
The authors have verified that these considerations are fully applicable to this document.
</t>
      <t indent="0" pn="section-6-2">
In-depth security analysis for each specific use case is beyond the scope of this document
and will be addressed in future solution documents. It is strongly recommended
that these solution documents undergo review by a security expert early in their development,
ideally during the Working Group Last Call phase.
</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-rtgwg-segment-routing-ti-lfa" to="SR-TI-LFA"/>
    <displayreference target="I-D.ietf-teas-ns-ip-mpls" to="NS-IP-MPLS"/>
    <displayreference target="I-D.lm-mpls-sfc-path-verification" to="SFP-VERIF"/>
    <displayreference target="I-D.stein-srtsn" to="SRTSN"/>
    <displayreference target="I-D.zzhang-intarea-generic-delivery-functions" to="GDF"/>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC9789" target="https://www.rfc-editor.org/info/rfc9789" quoteTitle="true" derivedAnchor="RFC9789">
          <front>
            <title>MPLS Network Actions (MNAs) Framework</title>
            <author initials="L." surname="Andersson" fullname="Loa Andersson">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author initials="S." surname="Bryant" fullname="Stewart Bryant">
              <organization showOnFrontPage="true">University of Surrey 5GIC</organization>
            </author>
            <author initials="M." surname="Bocci" fullname="Matthew Bocci">
              <organization showOnFrontPage="true">Nokia</organization>
            </author>
            <author initials="T." surname="Li" fullname="Tony Li">
              <organization showOnFrontPage="true">Juniper Networks</organization>
            </author>
            <date month="July" year="2025"/>
          </front>
          <seriesInfo name="RFC" value="9789"/>
          <seriesInfo name="DOI" value="10.17487/RFC9789"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.zzhang-intarea-generic-delivery-functions" target="https://datatracker.ietf.org/doc/html/draft-zzhang-intarea-generic-delivery-functions-03" quoteTitle="true" derivedAnchor="GDF">
          <front>
            <title>Generic Delivery Functions</title>
            <author fullname="Zhaohui (Jeffrey) Zhang" initials="Z." surname="Zhang">
              <organization showOnFrontPage="true">Juniper Networks</organization>
            </author>
            <author fullname="Ron Bonica" initials="R." surname="Bonica">
              <organization showOnFrontPage="true">Juniper Networks</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization showOnFrontPage="true">Juniper Networks</organization>
            </author>
            <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
              <organization showOnFrontPage="true">ZTE</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t indent="0">
Some functionalities (e.g., fragmentation/reassembly and Encapsulating Security Payload) provided by IPv6 can be viewed as delivery functions independent of IPv6 or even IP entirely. This document proposes to provide those functionalities at different layers (e.g., MPLS, BIER or even Ethernet) independent of IP.
</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-zzhang-intarea-generic-delivery-functions-03"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-ip-mpls" target="https://datatracker.ietf.org/doc/html/draft-ietf-teas-ns-ip-mpls-05" quoteTitle="true" derivedAnchor="NS-IP-MPLS">
          <front>
            <title>Realizing Network Slices in IP/MPLS Networks</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization showOnFrontPage="true">Cisco Systems Inc.</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V." surname="Beeram">
              <organization showOnFrontPage="true">Juniper Networks</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author fullname="Joel M. Halpern" initials="J." surname="Halpern">
              <organization showOnFrontPage="true">Ericsson</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization showOnFrontPage="true">ZTE Corporation</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t indent="0">
Realizing network slices may require the Service Provider to have the ability to partition a physical network into multiple logical networks of varying sizes, structures, and functions so that each slice can be dedicated to specific services or customers. Multiple network slices can be realized on the same network while ensuring slice elasticity in terms of network resource allocation. This document describes a scalable solution to realize network slicing in IP/MPLS networks by supporting multiple services on top of a single physical network by relying on compliant domains and nodes to provide forwarding treatment (scheduling, drop policy, resource usage) on to packets that carry identifiers that indicate the slicing service that is to be applied to the packets.
</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-05"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC3032" target="https://www.rfc-editor.org/info/rfc3032" quoteTitle="true" derivedAnchor="RFC3032">
          <front>
            <title>MPLS Label Stack Encoding</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="G. Fedorkow" initials="G." surname="Fedorkow"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <date month="January" year="2001"/>
            <abstract>
              <t indent="0">This document specifies the encoding to be used by an LSR in order to transmit labeled packets on Point-to-Point Protocol (PPP) data links, on LAN data links, and possibly on other data links as well. This document also specifies rules and procedures for processing the various fields of the label stack encoding. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3032"/>
          <seriesInfo name="DOI" value="10.17487/RFC3032"/>
        </reference>
        <reference anchor="RFC4090" target="https://www.rfc-editor.org/info/rfc4090" quoteTitle="true" derivedAnchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t indent="0">This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t indent="0">Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="RFC4385" target="https://www.rfc-editor.org/info/rfc4385" quoteTitle="true" derivedAnchor="RFC4385">
          <front>
            <title>Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for Use over an MPLS PSN</title>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <author fullname="L. Martini" initials="L." surname="Martini"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="February" year="2006"/>
            <abstract>
              <t indent="0">This document describes the preferred design of a Pseudowire Emulation Edge-to-Edge (PWE3) Control Word to be used over an MPLS packet switched network, and the Pseudowire Associated Channel Header. The design of these fields is chosen so that an MPLS Label Switching Router performing MPLS payload inspection will not confuse a PWE3 payload with an IP payload. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4385"/>
          <seriesInfo name="DOI" value="10.17487/RFC4385"/>
        </reference>
        <reference anchor="RFC5085" target="https://www.rfc-editor.org/info/rfc5085" quoteTitle="true" derivedAnchor="RFC5085">
          <front>
            <title>Pseudowire Virtual Circuit Connectivity Verification (VCCV): A Control Channel for Pseudowires</title>
            <author fullname="T. Nadeau" initials="T." role="editor" surname="Nadeau"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="December" year="2007"/>
            <abstract>
              <t indent="0">This document describes Virtual Circuit Connectivity Verification (VCCV), which provides a control channel that is associated with a pseudowire (PW), as well as the corresponding operations and management functions (such as connectivity verification) to be used over that control channel. VCCV applies to all supported access circuit and transport types currently defined for PWs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5085"/>
          <seriesInfo name="DOI" value="10.17487/RFC5085"/>
        </reference>
        <reference anchor="RFC5286" target="https://www.rfc-editor.org/info/rfc5286" quoteTitle="true" derivedAnchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t indent="0">This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5586" target="https://www.rfc-editor.org/info/rfc5586" quoteTitle="true" derivedAnchor="RFC5586">
          <front>
            <title>MPLS Generic Associated Channel</title>
            <author fullname="M. Bocci" initials="M." role="editor" surname="Bocci"/>
            <author fullname="M. Vigoureux" initials="M." role="editor" surname="Vigoureux"/>
            <author fullname="S. Bryant" initials="S." role="editor" surname="Bryant"/>
            <date month="June" year="2009"/>
            <abstract>
              <t indent="0">This document generalizes the applicability of the pseudowire (PW) Associated Channel Header (ACH), enabling the realization of a control channel associated to MPLS Label Switched Paths (LSPs) and MPLS Sections in addition to MPLS pseudowires. In order to identify the presence of this Associated Channel Header in the label stack, this document also assigns one of the reserved MPLS label values to the Generic Associated Channel Label (GAL), to be used as a label based exception mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5586"/>
          <seriesInfo name="DOI" value="10.17487/RFC5586"/>
        </reference>
        <reference anchor="RFC7212" target="https://www.rfc-editor.org/info/rfc7212" quoteTitle="true" derivedAnchor="RFC7212">
          <front>
            <title>MPLS Generic Associated Channel (G-ACh) Advertisement Protocol</title>
            <author fullname="D. Frost" initials="D." surname="Frost"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="M. Bocci" initials="M." surname="Bocci"/>
            <date month="June" year="2014"/>
            <abstract>
              <t indent="0">The MPLS Generic Associated Channel (G-ACh) provides an auxiliary logical data channel associated with a Label Switched Path (LSP), a pseudowire, or a section (link) over which a variety of protocols may flow. These protocols are commonly used to provide Operations, Administration, and Maintenance (OAM) mechanisms associated with the primary data channel. This document specifies simple procedures by which an endpoint of an LSP, pseudowire, or section may inform the other endpoints of its capabilities and configuration parameters, or other application-specific information. This information may then be used by the receiver to validate or adjust its local configuration, and by the network operator for diagnostic purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7212"/>
          <seriesInfo name="DOI" value="10.17487/RFC7212"/>
        </reference>
        <reference anchor="RFC7490" target="https://www.rfc-editor.org/info/rfc7490" quoteTitle="true" derivedAnchor="RFC7490">
          <front>
            <title>Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)</title>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="N. So" initials="N." surname="So"/>
            <date month="April" year="2015"/>
            <abstract>
              <t indent="0">This document describes an extension to the basic IP fast reroute mechanism, described in RFC 5286, that provides additional backup connectivity for point-to-point link failures when none can be provided by the basic mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7490"/>
          <seriesInfo name="DOI" value="10.17487/RFC7490"/>
        </reference>
        <reference anchor="RFC7799" target="https://www.rfc-editor.org/info/rfc7799" quoteTitle="true" derivedAnchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t indent="0">This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8296" target="https://www.rfc-editor.org/info/rfc8296" quoteTitle="true" derivedAnchor="RFC8296">
          <front>
            <title>Encapsulation for Bit Index Explicit Replication (BIER) in MPLS and Non-MPLS Networks</title>
            <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <author fullname="A. Dolganow" initials="A." surname="Dolganow"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
            <author fullname="I. Meilik" initials="I." surname="Meilik"/>
            <date month="January" year="2018"/>
            <abstract>
              <t indent="0">Bit Index Explicit Replication (BIER) is an architecture that provides optimal multicast forwarding through a "multicast domain", without requiring intermediate routers to maintain any per-flow state or to engage in an explicit tree-building protocol. When a multicast data packet enters the domain, the ingress router determines the set of egress routers to which the packet needs to be sent. The ingress router then encapsulates the packet in a BIER header. The BIER header contains a bit string in which each bit represents exactly one egress router in the domain; to forward the packet to a given set of egress routers, the bits corresponding to those routers are set in the BIER header. The details of the encapsulation depend on the type of network used to realize the multicast domain. This document specifies a BIER encapsulation that can be used in an MPLS network or, with slight differences, in a non-MPLS network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8296"/>
          <seriesInfo name="DOI" value="10.17487/RFC8296"/>
        </reference>
        <reference anchor="RFC8300" target="https://www.rfc-editor.org/info/rfc8300" quoteTitle="true" derivedAnchor="RFC8300">
          <front>
            <title>Network Service Header (NSH)</title>
            <author fullname="P. Quinn" initials="P." role="editor" surname="Quinn"/>
            <author fullname="U. Elzur" initials="U." role="editor" surname="Elzur"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="January" year="2018"/>
            <abstract>
              <t indent="0">This document describes a Network Service Header (NSH) imposed on packets or frames to realize Service Function Paths (SFPs). The NSH also provides a mechanism for metadata exchange along the instantiated service paths. The NSH is the Service Function Chaining (SFC) encapsulation required to support the SFC architecture (defined in RFC 7665).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8300"/>
          <seriesInfo name="DOI" value="10.17487/RFC8300"/>
        </reference>
        <reference anchor="RFC8595" target="https://www.rfc-editor.org/info/rfc8595" quoteTitle="true" derivedAnchor="RFC8595">
          <front>
            <title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <date month="June" year="2019"/>
            <abstract>
              <t indent="0">This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack. That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack. This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8595"/>
          <seriesInfo name="DOI" value="10.17487/RFC8595"/>
        </reference>
        <reference anchor="RFC8655" target="https://www.rfc-editor.org/info/rfc8655" quoteTitle="true" derivedAnchor="RFC8655">
          <front>
            <title>Deterministic Networking Architecture</title>
            <author fullname="N. Finn" initials="N." surname="Finn"/>
            <author fullname="P. Thubert" initials="P." surname="Thubert"/>
            <author fullname="B. Varga" initials="B." surname="Varga"/>
            <author fullname="J. Farkas" initials="J." surname="Farkas"/>
            <date month="October" year="2019"/>
            <abstract>
              <t indent="0">This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain. Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path. DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8655"/>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
        </reference>
        <reference anchor="RFC8957" target="https://www.rfc-editor.org/info/rfc8957" quoteTitle="true" derivedAnchor="RFC8957">
          <front>
            <title>Synonymous Flow Label Framework</title>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <date month="January" year="2021"/>
            <abstract>
              <t indent="0">RFC 8372 ("MPLS Flow Identification Considerations") describes the requirement for introducing flow identities within the MPLS architecture. This document describes a method of accomplishing this by using a technique called "Synonymous Flow Labels" in which labels that mimic the behavior of other labels provide the identification service. These identifiers can be used to trigger per-flow operations on the packet at the receiving label switching router.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8957"/>
          <seriesInfo name="DOI" value="10.17487/RFC8957"/>
        </reference>
        <reference anchor="RFC8964" target="https://www.rfc-editor.org/info/rfc8964" quoteTitle="true" derivedAnchor="RFC8964">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: MPLS</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga"/>
            <author fullname="J. Farkas" initials="J." surname="Farkas"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <date month="January" year="2021"/>
            <abstract>
              <t indent="0">This document specifies the Deterministic Networking (DetNet) data plane when operating over an MPLS Packet Switched Network. It leverages existing pseudowire (PW) encapsulations and MPLS Traffic Engineering (MPLS-TE) encapsulations and mechanisms. This document builds on the DetNet architecture and data plane framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8964"/>
          <seriesInfo name="DOI" value="10.17487/RFC8964"/>
        </reference>
        <reference anchor="RFC8986" target="https://www.rfc-editor.org/info/rfc8986" quoteTitle="true" derivedAnchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t indent="0">The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t indent="0">Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t indent="0">This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9197" target="https://www.rfc-editor.org/info/rfc9197" quoteTitle="true" derivedAnchor="RFC9197">
          <front>
            <title>Data Fields for In Situ Operations, Administration, and Maintenance (IOAM)</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="May" year="2022"/>
            <abstract>
              <t indent="0">In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document discusses the data fields and associated data types for IOAM. IOAM-Data-Fields can be encapsulated into a variety of protocols, such as Network Service Header (NSH), Segment Routing, Generic Network Virtualization Encapsulation (Geneve), or IPv6. IOAM can be used to complement OAM mechanisms based on, e.g., ICMP or other types of probe packets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9197"/>
          <seriesInfo name="DOI" value="10.17487/RFC9197"/>
        </reference>
        <reference anchor="RFC9263" target="https://www.rfc-editor.org/info/rfc9263" quoteTitle="true" derivedAnchor="RFC9263">
          <front>
            <title>Network Service Header (NSH) Metadata Type 2 Variable-Length Context Headers</title>
            <author fullname="Y. Wei" initials="Y." role="editor" surname="Wei"/>
            <author fullname="U. Elzur" initials="U." surname="Elzur"/>
            <author fullname="S. Majee" initials="S." surname="Majee"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="August" year="2022"/>
            <abstract>
              <t indent="0">Service Function Chaining (SFC) uses the Network Service Header (NSH) (RFC 8300) to steer and provide context metadata (MD) with each packet. Such metadata can be of various types, including MD Type 2, consisting of Variable-Length Context Headers. This document specifies several such Context Headers that can be used within a Service Function Path (SFP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9263"/>
          <seriesInfo name="DOI" value="10.17487/RFC9263"/>
        </reference>
        <reference anchor="RFC9326" target="https://www.rfc-editor.org/info/rfc9326" quoteTitle="true" derivedAnchor="RFC9326">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Direct Exporting</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="B. Gafni" initials="B." surname="Gafni"/>
            <author fullname="F. Brockners" initials="F." surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="November" year="2022"/>
            <abstract>
              <t indent="0">In situ Operations, Administration, and Maintenance (IOAM) is used for recording and collecting operational and telemetry information. Specifically, IOAM allows telemetry data to be pushed into data packets while they traverse the network. This document introduces a new IOAM option type (denoted IOAM-Option-Type) called the "IOAM Direct Export (DEX) Option-Type". This Option-Type is used as a trigger for IOAM data to be directly exported or locally aggregated without being pushed into in-flight data packets. The exporting method and format are outside the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9326"/>
          <seriesInfo name="DOI" value="10.17487/RFC9326"/>
        </reference>
        <reference anchor="RFC9341" target="https://www.rfc-editor.org/info/rfc9341" quoteTitle="true" derivedAnchor="RFC9341">
          <front>
            <title>Alternate-Marking Method</title>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="M. Cociglio" initials="M." surname="Cociglio"/>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="T. Zhou" initials="T." surname="Zhou"/>
            <date month="December" year="2022"/>
            <abstract>
              <t indent="0">This document describes the Alternate-Marking technique to perform packet loss, delay, and jitter measurements on live traffic. This technology can be applied in various situations and for different protocols. According to the classification defined in RFC 7799, it could be considered Passive or Hybrid depending on the application. This document obsoletes RFC 8321.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9341"/>
          <seriesInfo name="DOI" value="10.17487/RFC9341"/>
        </reference>
        <reference anchor="RFC9342" target="https://www.rfc-editor.org/info/rfc9342" quoteTitle="true" derivedAnchor="RFC9342">
          <front>
            <title>Clustered Alternate-Marking Method</title>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="M. Cociglio" initials="M." surname="Cociglio"/>
            <author fullname="A. Sapio" initials="A." surname="Sapio"/>
            <author fullname="R. Sisto" initials="R." surname="Sisto"/>
            <author fullname="T. Zhou" initials="T." surname="Zhou"/>
            <date month="December" year="2022"/>
            <abstract>
              <t indent="0">This document generalizes and expands the Alternate-Marking methodology to measure any kind of unicast flow whose packets can follow several different paths in the network; this can result in a multipoint-to-multipoint network. The network clustering approach is presented and, for this reason, the technique described here is called "Clustered Alternate Marking". This document obsoletes RFC 8889.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9342"/>
          <seriesInfo name="DOI" value="10.17487/RFC9342"/>
        </reference>
        <reference anchor="RFC9543" target="https://www.rfc-editor.org/info/rfc9543" quoteTitle="true" derivedAnchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t indent="0">This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t indent="0">The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t indent="0">This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC9546" target="https://www.rfc-editor.org/info/rfc9546" quoteTitle="true" derivedAnchor="RFC9546">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) for Deterministic Networking (DetNet) with the MPLS Data Plane</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <author fullname="B. Varga" initials="B." surname="Varga"/>
            <date month="February" year="2024"/>
            <abstract>
              <t indent="0">This document defines format and usage principles of the Deterministic Networking (DetNet) service Associated Channel over a DetNet network with the MPLS data plane. The DetNet service Associated Channel can be used to carry test packets of active Operations, Administration, and Maintenance (OAM) protocols that are used to detect DetNet failures and measure performance metrics.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9546"/>
          <seriesInfo name="DOI" value="10.17487/RFC9546"/>
        </reference>
        <reference anchor="RFC9613" target="https://www.rfc-editor.org/info/rfc9613" quoteTitle="true" derivedAnchor="RFC9613">
          <front>
            <title>Requirements for Solutions that Support MPLS Network Actions (MNAs)</title>
            <author fullname="M. Bocci" initials="M." role="editor" surname="Bocci"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <date month="August" year="2024"/>
            <abstract>
              <t indent="0">This document specifies requirements for the development of MPLS Network Actions (MNAs) that affect the forwarding or other processing of MPLS packets. These requirements are informed by a number of proposals for additions to the MPLS information in the labeled packet to allow such actions to be performed, either by a transit or terminating Label Switching Router (i.e., the Label Edge Router - LER).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9613"/>
          <seriesInfo name="DOI" value="10.17487/RFC9613"/>
        </reference>
        <reference anchor="I-D.lm-mpls-sfc-path-verification" target="https://datatracker.ietf.org/doc/html/draft-lm-mpls-sfc-path-verification-03" quoteTitle="true" derivedAnchor="SFP-VERIF">
          <front>
            <title>MPLS-based Service Function Path(SFP) Consistency Verification</title>
            <author fullname="Yao Liu" initials="Y." surname="Liu">
              <organization showOnFrontPage="true">ZTE</organization>
            </author>
            <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
              <organization showOnFrontPage="true">Ericsson</organization>
            </author>
            <date day="11" month="June" year="2022"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lm-mpls-sfc-path-verification-03"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa" target="https://datatracker.ietf.org/doc/html/draft-ietf-rtgwg-segment-routing-ti-lfa-21" quoteTitle="true" derivedAnchor="SR-TI-LFA">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization showOnFrontPage="true">Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization showOnFrontPage="true">Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization showOnFrontPage="true">Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization showOnFrontPage="true">INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization showOnFrontPage="true">Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization showOnFrontPage="true">Bell Canada</organization>
            </author>
            <date day="12" month="February" year="2025"/>
            <abstract>
              <t indent="0">This document presents Topology Independent Loop-free Alternate Fast Reroute (TI-LFA), aimed at providing protection of node and adjacency segments within the Segment Routing (SR) framework. This Fast Reroute (FRR) behavior builds on proven IP Fast Reroute concepts being LFAs, remote LFAs (RLFA), and remote LFAs with directed forwarding (DLFA). It extends these concepts to provide guaranteed coverage in any two-connected networks using a link-state IGP. An important aspect of TI-LFA is the FRR path selection approach establishing protection over the expected post-convergence paths from the point of local repair, reducing the operational need to control the tie-breaks among various FRR options.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.stein-srtsn" target="https://datatracker.ietf.org/doc/html/draft-stein-srtsn-01" quoteTitle="true" derivedAnchor="SRTSN">
          <front>
            <title>Segment Routed Time Sensitive Networking</title>
            <author fullname="Yaakov (J) Stein" initials="Y(J)." surname="Stein">
              <organization showOnFrontPage="true">RAD</organization>
            </author>
            <date day="29" month="August" year="2021"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-stein-srtsn-01"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="futuristic-functions" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-use-cases-for-continued-dis">Use Cases for Continued Discussion</name>
      <t indent="0" pn="section-appendix.a-1">Several use cases for which MNA can provide a viable solution have been discussed.
The discussion of these aspirational cases is ongoing at the time of publication of the document.</t>
      <section anchor="generic-delivery-functions" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.1">
        <name slugifiedName="name-generic-delivery-functions">Generic Delivery Functions</name>
        <t indent="0" pn="section-appendix.a.1-1">Generic Delivery Functions (GDFs), defined in
<xref target="I-D.zzhang-intarea-generic-delivery-functions" format="default" sectionFormat="of" derivedContent="GDF"/>, provide a new mechanism to
support functions analogous to those supported through the IPv6 Extension
Headers mechanism. For example, GDF can support fragmentation/reassembly
functionality in the MPLS network by using the Generic Fragmentation Header.
MNA can support GDF by placing a GDF header in an MPLS packet within the
post-stack data block <xref target="RFC9789" format="default" sectionFormat="of" derivedContent="RFC9789"/>. Multiple GDF headers, organized as a list of headers, can also
be present in the same MPLS packet.</t>
      </section>
      <section anchor="delay-budgets-for-time-bound-applications" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.2">
        <name slugifiedName="name-delay-budgets-for-time-boun">Delay Budgets for Time-Bound Applications</name>
        <t indent="0" pn="section-appendix.a.2-1">The routers in a network can perform two distinct functions on incoming
packets: forwarding (where the packet should be sent) and scheduling
(when the packet should be sent). IEEE-802.1 Time-Sensitive Networking (TSN) and
DetNet provide several mechanisms for scheduling under the
assumption that routers are time-synchronized.  The most effective mechanisms
for delay minimization involve per-flow resource allocation.</t>
        <t indent="0" pn="section-appendix.a.2-2">Segment Routing (SR) is a forwarding paradigm that allows encoding forwarding
instructions in the packet in a stack data structure rather than being
programmed into the routers.  The SR instructions are contained within a packet
in the form of a First-In, First-Out stack, dictating the forwarding decisions of
successive routers.  Segment routing may be used to choose a path sufficiently
short to be capable of providing bounded end-to-end latency but does
not influence the queueing of individual packets in each router along that path.</t>
        <t indent="0" pn="section-appendix.a.2-3">When carried over the MPLS data plane, a solution is required to enable the
delivery of such packets to their final destination within a
given time budget. One approach to address this use case in SR over MPLS (SR-MPLS) is
described in <xref target="I-D.stein-srtsn" format="default" sectionFormat="of" derivedContent="SRTSN"/>.</t>
      </section>
      <section anchor="stack-based-methods-for-latency-control" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.3">
        <name slugifiedName="name-stack-based-methods-for-lat">Stack-Based Methods for Latency Control</name>
        <t indent="0" pn="section-appendix.a.3-1">One efficient data structure for inserting local deadlines into
the headers is a "stack", similar to that used in SR to
carry forwarding instructions.  The number of deadline values in the
stack equals the number of routers the packet needs to traverse in
the network, and each deadline value corresponds to a specific
router.  The Top of Stack (ToS) corresponds to the first router's
deadline, while the MPLS BoS refers to the last.  All
local deadlines in the stack are later than or equal to the current time
(upon which all routers agree), and times closer to the ToS are
always earlier than or equal to times closer to the MPLS BoS.</t>
        <t indent="0" pn="section-appendix.a.3-2">The ingress router inserts the deadline stack into the packet headers; no other
router needs to know the requirements of the time-bound flows.
Hence, admitting a new flow only requires updating the ingress router's information base.</t>
        <t indent="0" pn="section-appendix.a.3-3">MPLS LSRs that expose the ToS label can also inspect the
associated deadline carried in the packet (either in the MPLS stack as in-stack data or
after BoS as post-stack data).</t>
      </section>
    </section>
    <section anchor="acknowledgement" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.b-1">The authors gratefully acknowledge the input of the members of the
      MPLS Open Design Team. Also, the authors sincerely thank <contact fullname="Loa Andersson"/>, <contact fullname="Xiao Min"/>, <contact fullname="Jie Dong"/>, and <contact fullname="Yaron Sheffer"/> for their
      thoughtful suggestions and help in improving the document.</t>
    </section>
    <section anchor="contr-sec" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.c">
      <name slugifiedName="name-contributors">Contributors</name>
      <contact fullname="Loa Anderssen" initials="L." surname="Anderssen">
        <organization showOnFrontPage="true">Bronze Dragon Consulting</organization>
        <address>
          <email>loa@pi.nu</email>
        </address>
      </contact>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.d">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="T." surname="Saad" fullname="Tarek Saad">
        <organization showOnFrontPage="true">Cisco Systems, Inc.</organization>
        <address>
          <email>tsaad.net@gmail.com</email>
        </address>
      </author>
      <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
        <organization showOnFrontPage="true">Independent</organization>
        <address>
          <email>kiran.ietf@gmail.com</email>
        </address>
      </author>
      <author initials="H." surname="Song" fullname="Haoyu Song">
        <organization showOnFrontPage="true">Futurewei Technologies</organization>
        <address>
          <email>haoyu.song@futurewei.com</email>
        </address>
      </author>
      <author initials="G." surname="Mirsky" fullname="Greg Mirsky">
        <organization showOnFrontPage="true">Ericsson</organization>
        <address>
          <email>gregimirsky@gmail.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
