<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-dong-fantel-problem-statement-02"
     ipr="trust200902" updates="">
  <front>
    <title abbrev="Fast Network Notifications Problem Statement">Fast Network
    Notifications Problem Statement</title>

    <author fullname="Jie Dong (editor)" initials="J." surname="Dong, Ed.">
      <organization>Huawei Technologies</organization>

      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>

    <author fullname="Mike McBride (editor)" initials="M."
            surname="McBride, Ed.">
      <organization>Futurewei</organization>

      <address>
        <email>mmcbride7@gmail.com</email>
      </address>
    </author>

    <author fullname="Francois Clad (editor)" initials="F."
            surname="Clad, Ed.">
      <organization>Cisco Systems</organization>

      <address>
        <email>fclad@cisco.com</email>
      </address>
    </author>

    <author fullname="Jeffrey Zhang" initials="Z." surname="Zhang">
      <organization>Juniper Networks</organization>

      <address>
        <email>zzhang@juniper.net</email>
      </address>
    </author>

    <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
      <organization>China Telecom</organization>

      <address>
        <email>zhuyq8@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Xiaohu Xu" initials="X." surname="Xu">
      <organization>China Mobile</organization>

      <address>
        <email>xuxiaohu_ietf@hotmail.com</email>
      </address>
    </author>

    <author fullname="Rui Zhuang" initials="R." surname="Zhuang">
      <organization>China Mobile</organization>

      <address>
        <email>zhuangruiyjy@chinamobile.com</email>
      </address>
    </author>

    <author fullname="Ran Pang" initials="R." surname="Pang">
      <organization>China Unicom</organization>

      <address>
        <email>pangran@chinaunicom.cn</email>
      </address>
    </author>

    <author fullname="Hao Lu" initials="H." surname="Lu">
      <organization>Tencent</organization>

      <address>
        <email>vickkylu@tencent.com</email>
      </address>
    </author>

    <author fullname="Yadong Liu" initials="Y." surname="Liu">
      <organization>Tencent</organization>

      <address>
        <email>zeepliu@tencent.com</email>
      </address>
    </author>

    <author fullname="Luis M. Contreras" initials="L." surname="Contreras">
      <organization>Telefonica</organization>

      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>

    <author fullname="Mehmet Durmus" initials="M." surname="Durmus">
      <organization>Turkcell</organization>

      <address>
        <email>mehmet.durmus@turkcell.com.tr</email>
      </address>
    </author>

    <date day="25" month="November" year="2025"/>

    <abstract>
      <t>Modern networks require adaptive traffic manipulation including
      Traffic Engineering (TE), load balancing, flow control and protection
      etc. to support applications like AI training and real-time services. A
      good and timely understanding of network operational status, such as
      congestion and failures, can help to improve utilization, reduce
      latency, and enable faster response to critical events. This document
      describes the existing problems and why the IETF may need a new set of
      fast network notifications related solutions to support any
      high-throughput, low-latency and lossless application.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Modern network applications, ranging from AI training to large-scale
      cloud services, require lossless and adaptive networks to ensure
      reliable, congestion-free data transfer within or across multiple data
      centers. These workloads demand high throughput, low latency, and
      minimal packet loss across dynamically shifting traffic patterns. To
      meet these requirements, networks employ mechanisms such as traffic
      engineering (TE), load balancing, flow control, and protection. However,
      existing solutions often face limitations in responsiveness, coverage,
      and operational complexity, particularly in high-speed, large-scale
      environments.</t>

      <t>This document summarizes the limitations of existing mechanisms that
      prevent rapid notification and action to critical network events,
      including link or node failures and congestion. It also identifies the
      need for fast network notification which is critical for enabling fast
      reaction. In the context of this draft, fast does not imply a single,
      rigid numerical time threshold. Instead, it characterizes a class of
      mechanisms to minimize the delivery time so that the end-to-end latency
      of the notification is on the order of sub-milliseconds or milliseconds,
      depending on the operational objective and the range of the network
      domain.</t>

      <t>This document describes why the IETF may need a new set of fast
      network notification related solutions to support these use cases. <xref
      target="I-D.geng-fantel-fantel-gap-analysis"/> provides a gap analysis
      of existing solutions and where they are deficient in supporting high
      demand services. This document primarily focuses on describing the
      problem space.</t>

      <section anchor="requirements-language" title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
        document are to be interpreted as described in <xref
        target="RFC2119">RFC 2119</xref>.</t>
      </section>
    </section>

    <section title="Glossary">
      <t>FRR: Fast Re-Route</t>

      <t>ECN: Explicit Congestion Notification</t>

      <t>BFD: Bidirectional Forwarding Detection</t>

      <t>IOAM: In-situ Operations, Administration, and Maintenance</t>
    </section>

    <section title="The Problem with Existing Notification Mechanisms">
      <t>Current network traffic manipulation mechanisms such as TE, load
      balancing, flow control, and protection, has deficiencies in providing
      the low-latency, high-granularity responsiveness needed in modern,
      dynamic networks, at least in part due to the lack of dynamic network
      state information. This results in suboptimal performance, low
      reliability and delayed recovery. Fast network notifications is proposed
      as a set of solutions to address this by enabling real-time, lightweight
      notifications that enhance the responsiveness for traffic engineering,
      congestion mitigation, and failure protection. There is a demonstrable
      need for a standardized framework in IETF to define these fast network
      notification mechanisms, requirements and integration strategies.</t>

      <t>The following describes a summary of the limitations of existing
      notification mechanisms:<list style="symbols">
          <t>Slow Reaction: Existing control protocols (e.g., routing
          protocol, etc.) may be used for dissemination of dynamic network
          state information, while they usually rely on control plane based
          hop-by-hop distribution, which causes delay when the recipient is
          multiple hops away. With modern high-throughput environments (AI/ML
          clusters, multi-DC WANs), this delay is often prohibitive. Explicit
          Congestion Notification (ECN) <xref target="RFC3168"/> needs
          congestion signals to be sent back to the sender, which introduces
          Round-Trip-Time (RTT) delay and can be slow if the source node is
          far away, and it relies on the source node to take action in the
          transport layer. What is needed is a lightweight signaling method
          that can provide real-time alerts (e.g., at the level of
          sub-milliseconds or milliseconds) on failures, congestion, or
          threshold breaches, enabling immediate actions (e.g., in ms to 10s
          ms ranges) in the network layer.</t>

          <t>Coarse-Grained Signals: Classic ECN <xref target="RFC3168"/> and
          similar mechanisms only provide binary or threshold-based feedback.
          The lack of granularity prevents rapid, fine-tuned adjustments,
          which can lead to either overreaction and underutilization of the
          available capacity , or underreaction that fails to alleviate the
          congestion. What would be useful is a set of notifications that
          aren't just "on-off" state reports but can also convey more
          information like congestion level/utilization information, latency
          spikes, queue buildup or flow characteristics, so that it can
          trigger immediate and precise responses like rerouting, rate
          adjustment, or protection switching for specific flows.</t>

          <t>Local-Only Decision Making: Current load-balancing, flow-control
          and FRR techniques often act on local information and fail to
          capture downstream or cross-domain network conditions, limiting
          their effectiveness and can lead to suboptimal decisions. For
          example, the Point of Local Repair (PLR) executing FRR makes its
          decision based on its local view of the topology and network status.
          It may switch traffic to a backup path and cause cascading
          congestion on that path, as it lacks visibility into the state of
          the entire backup path. Similarly, traditional load-balancing is
          based on local link utilization information, which may cause some
          paths overloaded while others remain underutilized. The local view
          of network status prevents precise and globally optimized decisions
          and adjustments. It would be helpful to send fast network
          notifications to upstream nodes which can perform action based on
          the view of regional or global network conditions.</t>

          <t>Overhead and Scalability Challenges: The distribution of
          high-volume network operational status information or frequent
          signaling introduces bandwidth and processing overhead. At scale,
          this becomes a bottleneck rather than a solution. IOAM <xref
          target="RFC9197"/> and similar tools provide detailed telemetry
          information, but the collection and feedback loops are
          controller-centric. They cannot be used to deliver lightweight,
          real-time alerts for immediate action on specific network nodes.
          Carrying dynamic network state information in control protocols
          (e.g. routing protocols) also increases the overhead and churn of
          the control plane, which may have negative impact to the core
          functionality of the protocol. It would be useful to have solutions
          designed to avoid the overhead and churn introduced by telemetry
          flooding or route distribution, so it can adapt to large-scale
          networks and dynamic traffic patterns (e.g. AI workloads, cloud WAN
          bursts).</t>
        </list></t>
    </section>

    <section anchor="fantel.fast"
             title="Why Fast Network Notification is Needed">
      <t>In particular, failure-detection and state-change propagation must
      occur within a timeframe short enough to meaningfully influence traffic
      engineering and load-balancing decisions before congestion or
      micro-loops develop. In backbone or datacenter networks, this typically
      implies a target of approximately 1-5 ms for notification delivery, with
      some environments requiring sub-millisecond performance. The precise
      requirement is driven by: <list style="symbols">
          <t>the speed at which traffic shifts can induce overload</t>

          <t>the granularity of TE tuning (fine-grained vs.
          coarse-grained)</t>

          <t>the propagation diameter of the network</t>

          <t>the responsiveness of the control-plane and forwarding-plane
          components</t>
        </list></t>

      <t>Therefore, this draft focuses on mechanisms capable of operating
      within these millisecond/sub-millisecond ranges, rather than mechanisms
      whose latency spans tens or hundreds of milliseconds, which are
      insufficient for preventing transient overload under rapid traffic
      transitions.</t>

      <section anchor="usecase"
               title="Example: AI Training Cluster with Fiber Link Failure">
        <t>Consider a large-scale AI/ML training job distributed across
        multiple data centers. These clusters exchange terabits per second of
        data between GPU nodes, requiring ultra-low latency and high
        throughput to maintain synchronization.</t>

        <figure anchor="ai-link-failure"
                title="Distributed AI Training Clusters with Fiber Link Failure">
          <artwork name="" type="ascii-art"><![CDATA[
    
           +-------------------------+       +-------------------------+
           |   Data Center A (GPU)   |-------|   Data Center B (GPU)   |
           +-------------------------+       +-------------------------+
                        |                              |
                        |     High-speed Fiber Link    |
                        +-----------X  (Failure) ------+
                                    |
                              (Failure Event)
    ]]></artwork>
        </figure>

        <t>As depicted in the above figure, a single fiber link failure or
        severe congestion event can disrupt the entire training run, leading
        to:</t>

        <list style="symbols">
          <t>Delays in job completion (hours to days for large models)</t>

          <t>Massive energy and compute cost waste due to
          resynchronization</t>

          <t>Degraded convergence accuracy if synchronization windows are
          missed</t>
        </list>

        <section anchor="current-limitations"
                 title="Limitations of Existing Mechanisms">
          <t>Today's mechanisms provide partial solutions but are not fast or
          precise enough for these scenarios:</t>

          <list style="symbols">
            <t>BFD <xref target="RFC5880"/>: Provides fast forwarding path
            failure detection. It can be used for both link and path failure
            detection, while it cannot be used to detect link or path
            congestion, nor can it notify the failure or congestion to other
            nodes in the network. BFD is preconfigured with periodic message
            exchange, while fast notifications needs to be event-driven. When
            the transmit interval is set to a small value (e.g., at the level
            of ms), frequent BFD message exchange may become a burden to some
            systems.</t>

            <t>FRR <xref target="RFC4090"/><xref target="RFC5714"/>/Route
            convergence: Without fast notification, the failure detection can
            take tens of milliseconds, followed by either local repair (FRR)
            or route convergence. The former lacks of global network situation
            thus may cause congestion on the backup paths, while the latter
            may breach strict synchronization deadlines.</t>

            <t>ECN <xref target="RFC3168"/>: Provides binary congestion
            feedback to the endpoints, which is insufficient for granular
            congestion spikes on high-speed links, and the action can be
            slow.</t>

            <t>Telemetry (e.g., IOAM<xref target="RFC9197"/>): Offers detailed
            information, but relies on collection and RTT-based feedback,
            which delays action.</t>

            <t>Flow control at the receiver/sender: Tied to RTT or packet
            loss, unsuitable for the bursty nature of AI traffic patterns.</t>
          </list>

          <t>In practice, this means that by the time a fiber link failure is
          detected and recovery mechanisms are invoked, critical GPU
          synchronization barriers may already be missed, forcing rollbacks or
          restarts of the training process.</t>
        </section>

        <section anchor="fantel-solution"
                 title="How Fast Network Notifications Help">
          <t>Fast network notification mechanisms could improve the response
          to fiber link failures and congestion in distributed AI/ML
          clusters:</t>

          <list style="symbols">
            <t>Real-Time Alerts: Nodes adjacent to the failure or congestion
            could immediately (e.g., at 10 ms level) send lightweight
            notifications to nodes whose fowarding paths can be affected.</t>

            <t>Action-Oriented Response: Upon receiving the notification,
            routing and load balancing mechanisms could instantly shift
            traffic to backup paths or alternative DC interconnects.</t>

            <t>Granularity: Notifications could carry more detailed
            information than "link failure/congestion," e.g., indicating
            specific link utilization, queue buildup or microburst congestion,
            allowing differentiated responses to different traffic flows.</t>

            <t>Complementary: The fast notification solutions are
            complementary to BFD, FRR or Telemetry, it would bridge the time
            gap between event onset and slower control plane or
            telemetry-driven responses, and enable network-wide
            optimization.</t>
          </list>

          <t>By deploying fast notifications, large AI/ML workloads can
          maintain synchronization across data centers even during transient
          failures or congestion, protecting job completion time and resource
          utilization.</t>

          <t>Existing Approach:</t>

          <list style="symbols">
            <t>BFD detects failure after tens of ms</t>

            <t>FRR may cause congestion on backup paths</t>

            <t>Reroute/convergence delays impact GPU sync</t>

            <t>Result: Training stalls, compute resources wasted, job
            completion delayed</t>
          </list>

          <t>Fast Notifications Approach:</t>

          <list style="symbols">
            <t>BFD detects failure after tens of ms</t>

            <t>Fast notification alerts upstream nodes of failure or
            congestion in real time</t>

            <t>Regional or global TE steers traffic quickly to alternate
            link/path without causing new congestion</t>

            <t>Result: Training continues with minimal disruption</t>
          </list>
        </section>
      </section>
    </section>

    <section title="Fast Network Notifications Problem Statement">
      <t/>

      <section title="Information of Fast Network Notifications">
        <t>The information carried in the fast network notifications, by the
        originating node, can be one or multiple of the following:</t>

        <t><list style="symbols">
            <t>Event Type: This can be used to indicate the type of events
            (e.g. failure, congestion, performance degradation, etc.).</t>

            <t>Location of Event: This can be used to indicate the location
            where the event occurred in the network (e.g. the identifier of
            the link, the node, or the queue, etc.).</t>

            <t>Fine-grained Network Status information: This can include
            quantifiable network metrics like link utilization, queue length,
            level of congestion, link or node delay, jitter, packet loss,
            etc.</t>

            <t>Path Identification information: This can be used to indicate
            the path which is affected by the event.</t>

            <t>Flow Identification information: This can include the
            identification or the 5-tuple of a flow which is affected by the
            event.</t>
          </list>Other information related to the network status change and
        need to be timely actioned may also be carried in the fast network
        notifications. Thus there is a need to work on the information model
        of fast network notifications to better understand what needs to be
        carried in the notifications.</t>
      </section>

      <section anchor="fantel-recipients"
               title="Recipients of Fast Network Notifications">
        <t>Fast network notifications may be consumed by two broad forms of
        recipients: (1) recipient nodes that participate directly in
        forwarding or signaling, and (2) functions and applications that
        consume notifications in order to optimize, monitor, or adapt
        behaviors as depicted in the following two tables. Separating these
        categories clarifies which entities are physical/logical nodes versus
        which are higher-level functional consumers:</t>

        <t><figure>
            <artwork><![CDATA[    +==================+======================+=======================+
    | Node Type        | Role                 | Example Benefit       |
    +==================+======================+=======================+
    | Adjacent Routers | Data-plane neighbors | Enable local repair   |
    | / Switches       | that forward packets | (e.g., FRR, ECMP      |
    |                  |                      | adjustments)          |
    +------------------+----------------------+-----------------------+
    | Non-Adjacent     | Remote upstream      | Accelerated awareness |
    | Routers /        | forwarding elements  | of failure/congestions|
    | Switches         |                      | on specific nodes     |
    +------------------+----------------------+-----------------------+
    | Ingress Routers  | Traffic entry points | Re-map affected flows |
    | / Switches       | of a network         | before forwarding     |
    |                  | domain               | into failed regions   |
    +------------------+----------------------+-----------------------+
    | End Hosts / Edge | Optional             | Adapt sending rate,   |
    | Nodes            | subscribers, policy- | select alternate      |
    |                  | driven               | uplinks               |
    +------------------+----------------------+-----------------------+
    |Network Controller| Optional             | Accelerated awareness |
    |                  | subscribers, policy- | of failure/congestion |
    |                  | driven               | for global TE/LB      |
    +------------------+----------------------+-----------------------+

                   Table 1: Recipient Nodes]]></artwork>
          </figure><figure>
            <artwork><![CDATA[   +=======================+===============+===========================+
   | Function /            | Role          | Example Benefit           |
   | Application           |               |                           |
   +=======================+===============+===========================+
   | Routing Protocols     | Control-plane | Accelerated path re-      |
   | (OSPF, IS-IS, BGP)    | convergence   | computation after failure |
   +-----------------------+---------------+---------------------------+
   | Traffic Engineering   | Centralized   | Pre-compute new paths     |
   | Element (PCE)         | optimization  | before congestion         |
   |                       |               | propagates                |
   +-----------------------+---------------+---------------------------+
   | Network Operators     | Operational   | Faster troubleshooting,   |
   | (NMS/OSS)             | visibility    | earlier alerting          |
   +-----------------------+---------------+---------------------------+
   | Telemetry /           | Monitoring    | Predictive analytics, ML- |
   | Analytics Systems     | and           | based congestion          |
   |                       | prediction    | forecasting               |
   +-----------------------+---------------+---------------------------+
   | Applications /        | Critical app  | AI workloads, financial   |
   | Services              | consumers     | apps adapt to degraded    |
   |                       |               | links                     |
   +-----------------------+---------------+---------------------------+

                 Table 2: Recipient Functions and Applications]]></artwork>
          </figure></t>

        <figure anchor="fantel-planes-diagram"
                title="Notification Recipients Across Network Planes">
          <artwork><![CDATA[
                   +-----------------------------+
                   |     Application Plane       |
                   |  - Applications / Services  |
                   |  - End Hosts / Edge Nodes   |
                   +-------------^---------------+
                                 |
                   +-------------|---------------+
                   |  Management Plane           |
                   |  - Operators (NMS/OSS)      |
                   |  - Telemetry / Analytics    |
                   +-------------^---------------+
                                 |
                   +-------------|---------------+
                   |  Control Plane              |
                   |  - Routing Protocols        |
                   |  - TE Controllers (PCE/SDN) |
                   +-------------^---------------+
                                 |
                   +-------------|----------------+
                   |  Data Plane                  |
                   |  - Adjacent Routers/Switches |
                   |  - Non-Adjacent Routers      |
                   |  - Ingress Routers           |
                   +------------------------------+
    ]]></artwork>
        </figure>

        <t/>

        <t>As illustrated in the figure above, the latency sensitivity of
        recipients decreases as one moves from the data plane to the
        application plane. Recipient nodes (e.g., adjacent forwarding
        elements, ingress routers, etc.) often require near-instantaneous
        notification, while functions and applications (e.g., routing
        protocols, analytics, NMS, etc.) may tolerate slightly longer
        timescales but still benefit from rapid awareness compared to existing
        mechanisms. The range of recipients of the notification depends on the
        type of recipients, it also depends on what type of action is
        required. The mechanism to determine the type and range of the
        recipients is something needs further consideration.</t>
      </section>

      <section title="Delivery of Fast Network Notifications">
        <t>Depending on the position and number of the recipient nodes, fast
        network notifications may be sent via one of the following delivery
        modes:</t>

        <t><list style="symbols">
            <t>Unicast directly to the recipient node</t>

            <t>Multicast to a group of recipient nodes</t>

            <t>Hop-by-hop to a series of receipt nodes along a specified
            path</t>

            <t>Flooding in a specified range of the network</t>
          </list></t>

        <t>Additionally, recipient nodes or functions may subscribe to
        specific types of notifications based on their roles or interests. A
        subscription-based approach enables selective delivery, reduces
        unnecessary signaling overhead, and ensures that each recipient
        receives only the information relevant to its function. Mechanisms
        supporting both delivery and subscription must guarantee timely,
        reliable, and secure propagation of notifications. Examples:</t>

        <t><list style="symbols">
            <t>Adjacent routers subscribing to all local failure
            notifications</t>

            <t>Centralized controllers subscribing only to congestion alerts
            exceeding defined thresholds</t>

            <t>Applications or analytics systems subscribing to performance
            degradation events affecting specific flows or services</t>
          </list>The mechanisms to support the above delivery mode needs to
        make sure the notification is always sent to the targeted recipient
        noded in a timely manner. It could be based on existing messaging and
        transport mechanisms, or a new protocol may be introduced.</t>
      </section>

      <section title="Actions to Fast Network Notifications">
        <t>Once a fast network notification is received, the recipient needs
        to take appropriate actions to help mitigating the event reported in
        the fast network notification. The action can be based on the
        information carried in the fast network notification, or it can be
        based on both the information of the notification and the information
        obtained by the recipient in other ways. The action to be performed by
        the recipient may be explicitly carried in the notification, or it may
        be implicitly determined by the type of information carried in the
        notification. Some actions are mandatory, while some actions can be
        optional. The possible actions to the notification can be but not
        limit to one or multiple of the following:</t>

        <t><list style="symbols">
            <t>Switch all traffic from a path to other available paths</t>

            <t>Steers specific traffic flows to alternate links or paths</t>

            <t>Modifies the load balancing ratio among a group of paths</t>

            <t>Sends the notification further to other recipients</t>
          </list></t>

        <t>Whether actions need to be explicitly indicated in the
        notification, and if so, which ones, requires further
        consideration.</t>
      </section>
    </section>

    <section title="Summary">
      <t>Current network mechanisms were not designed for the responsiveness
      and scale required by todays' dynamic environments. Techniques such as
      load balancing, protection switching, and flow control rely on telemetry
      and feedback loops that are often too slow, too coarse, or too
      resource-intensive. This results in performance bottlenecks, delayed
      recovery, and inefficiencies in large-scale AI, cloud, and WAN
      deployments. A fast network notification mechanism could help to address
      these gaps by providing lightweight, real-time, actionable alerts that
      complement existing tools and enable faster, more accurate network
      management decisions.</t>
    </section>

    <section title="IANA Considerations">
      <t>This document has no IANA actions.</t>
    </section>

    <section title="Security Considerations">
      <t>Fast network notifications, if not properly authenticated and
      rate-limited, could be exploited as a vector for Denial-of-Service (DoS)
      attacks. An attacker able to inject or flood spurious notifications may
      trigger unnecessary re-convergence, path changes or repeated state
      updates, overwhelming both recipient nodes and higher-level
      applications. Implementations must therefore ensure integrity
      protection, origin authentication, and appropriate rate controls on
      notification messages.</t>
    </section>

    <section title="Acknowledgement">
      <t>The authors would like to thank Alia Atlas, David Black, Jeffrey
      Haas, Tony Li and Carlos J. Bernardos for their valuable comments and
      discussion.</t>
    </section>

    <section title="Contributors">
      <t>The following people contributed substantially to the content of this
      document.</t>

      <t><figure>
          <artwork><![CDATA[Zafar Ali
Cisco
zali@cisco.com

Tianran Zhou
Huawei
zhoutianran@huawei.com

Xuesong Geng
Huawei
gengxuesong@huawei.com
]]></artwork>
        </figure></t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.I-D.geng-fantel-fantel-gap-analysis'?>

      <?rfc include='reference.RFC.3168'?>

      <?rfc include='reference.RFC.4090'?>

      <?rfc include='reference.RFC.5714'?>

      <?rfc include='reference.RFC.5880'?>

      <?rfc include='reference.RFC.9197'?>
    </references>
  </back>
</rfc>
