<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cats-framework-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="CATS Framework">A Framework for Computing-Aware Traffic Steering (CATS)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cats-framework-04"/>
    <author initials="C." surname="Li" fullname="Cheng Li" role="editor">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Du" fullname="Zongpeng Du">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>duzongpeng@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="J." surname="Drake" fullname="John E Drake">
      <organization>Juniper Networks, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>je_drake@yahoo.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="17"/>
    <area>Routing area</area>
    <workgroup>cats</workgroup>
    <keyword>User Experience</keyword>
    <keyword>Collaborative Networking</keyword>
    <keyword>Service optimization</keyword>
    <abstract>
      <?line 109?>

<t>This document describes a framework for Computing-Aware Traffic Steering (CATS). Particularly, the document identifies a set of CATS components, describes their interactions, and exemplifies the workflow of the control and data planes.</t>
    </abstract>
  </front>
  <middle>
    <?line 113?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Computing service architectures have been expanding from single service site to multiple, sometimes collaborative, service sites to address various issues (e.g., long response times or suboptimal service and network resource usage).</t>
      <t>The underlying networking infrastructures that include computing resources usually provide relatively static service dispatching (that is, the selection of the service instances that will be invoked for a request). In such infrastructures, service-specific traffic is often directed to the closest service site from a routing perspective without considering the actual network state (e.g., traffic congestion conditions) or the service site state.</t>
      <t>As described in <xref target="I-D.ietf-cats-usecases-requirements"/>, traffic steering that takes into account computing resource metrics would benefit several services, including latency-sensitive services like immersive services that rely upon the use of augmented reality or virtual reality (AR/VR) techniques. This document provides an architectural framework that aims at facilitating the making of compute- and network-aware traffic steering decisions in networking environments where computing service resources are deployed.</t>
      <t>The Computing-Aware Traffic Steering (CATS) framework assumes that there might be multiple service instances that are providing one given service. Each of these service instances can be accessed via a service contact instance. A single service site may have limited computing resources available at a given time, whereas the various service sites may experience different resource availability issues over time. A single service site may host one or multiple service contact instances.</t>
      <t>Steering in CATS is about selecting the appropriate service contact instance that will service a request according to a set of network and computing metrics. That selection may not necessarily reveal the actual service instance that will be invoked, e.g., in hierarchical or recursive contexts. Therefore, the metrics of the service contact instance may be the aggregated metrics from multiple service instances.</t>
      <t>The CATS framework is an overlay framework for the selection of the suitable service contact instance(s) from a set of candidates. The exact characterization of 'suitable' is determined by a combination of networking and computing metrics.</t>
      <t>Also, this document describes a workflow of the main CATS procedures that are executed in both the control and data planes.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Client:</dt>
        <dd>
          <t>An endpoint that is connected to a service provider network.</t>
        </dd>
        <dt>Computing-Aware Traffic Steering (CATS):</dt>
        <dd>
          <t>A traffic engineering approach <xref target="I-D.ietf-teas-rfc3272bis"/> that takes into account the dynamic nature of computing resources and network state to optimize service-specific traffic forwarding towards a given service contact instance. Various relevant metrics may be used to enforce such computing-aware traffic steering policies.</t>
        </dd>
        <dt>Metric:</dt>
        <dd>
          <t>An information that provides suitable input information to a selection mechanism to determine a CATS egress node.</t>
        </dd>
        <dt>Service:</dt>
        <dd>
          <t>An offering that is made available by a provider by orchestrating a set of resources (networking, compute, storage, etc.).</t>
        </dd>
        <dt/>
        <dd>
          <t>Which and how these resources are solicited is part of the service logic which is internal to the provider. For example, these resources may be:
</t>
          <ul spacing="normal">
            <li>
              <t>Exposed by one or multiple processes.</t>
            </li>
            <li>
              <t>Provided by virtual instances, physical, or a combination thereof.</t>
            </li>
            <li>
              <t>Hosted within the same or distinct nodes.</t>
            </li>
            <li>
              <t>Hosted within the same or multiple service sites.</t>
            </li>
            <li>
              <t>Chained to provide a service using a variety of means.</t>
            </li>
          </ul>
        </dd>
        <dt/>
        <dd>
          <t>How a service is structured is out of the scope of CATS.</t>
        </dd>
        <dt/>
        <dd>
          <t>The same service can be provided in many locations; each of them constitutes a service instance.</t>
        </dd>
        <dt>Computing Service:</dt>
        <dd>
          <t>An offering is made available by a provider by orchestrating a set of computing resources.</t>
        </dd>
        <dt>CATS Service ID (CS-ID):</dt>
        <dd>
          <t>An identifier representing a service, which the clients use to access it. See <xref target="cats-ids"/>.</t>
        </dd>
        <dt>Service instance:</dt>
        <dd>
          <t>An instance of running resources according to a given service logic.</t>
        </dd>
        <dt/>
        <dd>
          <t>Many such instances can be enabled by a provider. Instances that adhere to the same service logic provide the same service.</t>
        </dd>
        <dt/>
        <dd>
          <t>An instance is typically running in a service site. Clients' requests are serviced by one of these instances.</t>
        </dd>
        <dt>Service site:</dt>
        <dd>
          <t>A location that hosts the resources that are required to offer a service.</t>
        </dd>
        <dt/>
        <dd>
          <t>A service site may be a node or a set of nodes.</t>
        </dd>
        <dt/>
        <dd>
          <t>A CATS-serviced site is a service site that is connected to a CATS-Forwarder.</t>
        </dd>
        <dt>Service contact instance:</dt>
        <dd>
          <t>A client-facing service function instance that is responsible for receiving requests in the context of a given service.</t>
        </dd>
        <dt/>
        <dd>
          <t>A service contact instance can handle one or more service instances.</t>
        </dd>
        <dt/>
        <dd>
          <t>Steering beyond a service contact instance is hidden to both clients and CATS components.</t>
        </dd>
        <dt/>
        <dd>
          <t>A service request is processed according to the service logic (e.g., handle locally or solicit backend resources).</t>
        </dd>
        <dt/>
        <dd>
          <t>A service contact instance is reachable via at least one Egress CATS Forwarder.</t>
        </dd>
        <dt/>
        <dd>
          <t>A service can be accessed via multiple service contact instances running at the same or different locations (service sites).</t>
        </dd>
        <dt/>
        <dd>
          <t>A service contact instance may dispatch service requests to one or more service instances (e.g., a service contact instance that behaves as a service load-balancer).</t>
        </dd>
        <dt>CATS Service Contact Instance ID (CSCI-ID):</dt>
        <dd>
          <t>An identifier of a specific service contact instance. See <xref target="cats-ids"/>.</t>
        </dd>
        <dt>Computing-aware forwarding (or steering, computing):</dt>
        <dd>
          <t>A forwarding (or steering, computing) scheme which takes a set of metrics that reflect the capabilities and state of computing resources as input.</t>
        </dd>
        <dt>Service request:</dt>
        <dd>
          <t>A request to access or invoke a specific service. Such a request is steered to a service contact instance via CATS-Forwarders.</t>
        </dd>
        <dt/>
        <dd>
          <t>A service request is placed using service-specific protocols.</t>
        </dd>
        <dt/>
        <dd>
          <t>Service requests are not explicitly sent by clients to CATS-Forwarders.</t>
        </dd>
        <dt>CATS-Forwarder:</dt>
        <dd>
          <t>A network entity that steers traffic specific to a service request towards a corresponding yet selected service contact instance according to provisioned forwarding decisions. These decisions are supplied by a C-PS, which may or may not be on the CATS-Forwarder.</t>
        </dd>
        <dt/>
        <dd>
          <t>A CATS-Forwarder may behave as Ingress or Egress CATS-Forwarder.</t>
        </dd>
        <dt>Ingress CATS-Forwarder:</dt>
        <dd>
          <t>An entity that steers service-specific traffic along a CATS-computed path that leads to an Egress CATS-Forwarder that connects to the most suitable service site that host the service contact instance selected to satisfy the initial service request.</t>
        </dd>
        <dt>Egress CATS-Forwarder:</dt>
        <dd>
          <t>An entity that is located at the end of a CATS-computed path and which connects to a CATS-serviced site.</t>
        </dd>
        <dt>CATS Path Selector (C-PS):</dt>
        <dd>
          <t>A functional entity that selects paths towards service locations and instances and which accommodates the requirements of service requests. Such a path selection engine takes into account the service and network status information. See <xref target="sec-cps"/>.</t>
        </dd>
        <dt>CATS Service Metric Agent (C-SMA):</dt>
        <dd>
          <t>A functional entity that is responsible for collecting service capabilities and status, and for reporting them to a CATS Path Selector (C-PS). See <xref target="sec-csma"/>.</t>
        </dd>
        <dt>CATS Network Metric Agent (C-NMA):</dt>
        <dd>
          <t>A functional entity that is responsible for collecting network capabilities and status, and for reporting them to a C-PS. See <xref target="sec-cnma"/>.</t>
        </dd>
        <dt>CATS Traffic Classifier (C-TC):</dt>
        <dd>
          <t>A functional entity that is responsible for determining which packets belong to a traffic flow for a particular service request. It is also responsible for forwarding such packets along a C-PS computed path that leads to the relevant service contact instance. See <xref target="sec-ctc"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="Framework-and-concepts">
      <name>CATS Framework and Components</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>CATS assumes that there are multiple service instances running on different service sites, and which provide a given service that is represented by the same service identifier (see <xref target="cats-ids"/>). However, CATS does not make any assumption about these instances other than they are reachable via one or multiple service contact instances.</t>
      </section>
      <section anchor="cats-ids">
        <name>CATS Identifiers</name>
        <t>CATS uses the following identifiers:</t>
        <dl>
          <dt>CATS Service ID (CS-ID):</dt>
          <dd>
            <t>An identifier representing a service, which the clients use to access it. Such an ID identifies all the instances of a given service, regardless of their location.</t>
          </dd>
          <dt/>
          <dd>
            <t>The CS-ID is independent of which service contact instance serves the service request.</t>
          </dd>
          <dt/>
          <dd>
            <t>Service requests are spread over the service contact instances that can accommodate them, considering the location of the initiator of the service request and the availability (in terms of resource/traffic load, for example) of the service instances resource-wise among other considerations like traffic congestion conditions.</t>
          </dd>
          <dt>CATS Service Contact Instance ID (CSCI-ID):</dt>
          <dd>
            <t>An identifier of a specific service contact instance.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-cats-framework">
        <name>Framework Overview</name>
        <t>A high-level view of the CATS framework, without expanding the functional entities in the network, is illustrated in <xref target="fig-cats-fw"/>.</t>
        <figure anchor="fig-cats-fw">
          <name>Main CATS Interactions</name>
          <artwork><![CDATA[
   +----------------------------------+  |         +--------+
   |         Management Plane         |  |         |        |
   +----------------------------------+  |<=======>| C-SMA  |
   |           Control Plane          |  |         |        |
   +----------------------------------+  |         +---+----+
                   /\                    |             |
                   ||                    |             |
                   \/                    |             |
   +----------------------------------+  |         +--------+
   |           Data Plane             |  |         | +--------+
   +----------------------------------+  |<=======>| |Service |
                                         |         +-|Contact |
                                         |           |Instance|
                                         |           +--------+

            Network Domain                  Computing Domain
]]></artwork>
        </figure>
        <t>The following planes are defined:</t>
        <ul spacing="normal">
          <li>
            <t>CATS  Management Plane: Responsible for monitoring, configuring, and maintaining CATS network devices.</t>
          </li>
          <li>
            <t>CATS Control Plane: Responsible for scheduling services based on computing and network information. It is also responsible for making decisions about how packets should be forwarded by involved forwarding nodes and communicating such decisions to the CATS Data Plane for execution.</t>
          </li>
          <li>
            <t>CATS Data Plane: Responsible for computing-aware routing, including handling packets in the data path, such as packet forwarding.</t>
          </li>
        </ul>
        <t>Depending on implementation and deployment, these planes may consist of several functional elements/components, and the details will be described in the following sections.</t>
      </section>
      <section anchor="sec-cats-arch">
        <name>CATS Functional Components</name>
        <t>CATS nodes make forwarding decisions for a given service request that has been received from a client according to the capabilities and status information of both service contact instances and network. The main CATS functional elements and their interactions are shown in <xref target="fig-cats-components"/>.</t>
        <figure anchor="fig-cats-components">
          <name>CATS Functional Components</name>
          <artwork><![CDATA[
    +-----+              +------+           +------+
  +------+|            +------+ |         +------+ |
  |client|+            |client|-+         |client|-+
  +---+--+             +---+--+           +---+--+
      |                    |                  |
      | +----------------+ |            +-----+----------+
      +-+    C-TC#1      +-+      +-----+    C-TC#2      |
        |----------------|        |     |----------------|
        |     |C-PS#1    |    +------+  |CATS-Forwarder 4|
  ......|     +----------|....|C-PS#2|..|                |...
  :     |CATS-Forwarder 2|    |      |  |                |  .
  :     +----------------+    +------+  +----------------+  :
  :                                                         :
  :                                            +-------+    :
  :                         Underlay           | C-NMA |    :
  :                      Infrastructure        +-------+    :
  :                                                         :
  :                                                         :
  : +----------------+                +----------------+    :
  : |CATS-Forwarder 1|  +-------+     |CATS-Forwarder 3|    :
  :.|                |..|C-SMA#1|.... |                |....:
    +---------+------+  +-------+     +----------------+
              |         |             |   C-SMA#2      |
              |         |             +-------+--------+
              |         |                     |
              |         |                     |
           +------------+               +------------+
          +------------+ |             +------------+ |
          |  Service   | |             |  Service   | |
          |  Contact   | |             |  Contact   | |
          |  Instance  |-+             |  Instance  |-+
          +------------+               +------------+
           Service Site 1              Service Site 2
]]></artwork>
        </figure>
        <section anchor="sec-service-sites">
          <name>Service Sites, Services Instances, and Service Contact Instances</name>
          <t>As service instances are accessed via a service contact instance, a client will not see the service instances but only the service contact instance.</t>
          <t>Service sites are locations that host resources (including computing resources) that are required to offer a service. As mentioned in <xref target="cats-ids"/>, a compute service (e.g., for face recognition purposes or a game server) is uniquely identified by a CATS Service IDentifier (CS-ID). The CS-ID does not need to be globally unique, though.</t>
          <t>A single service can be represented and accessed via several contact instances that run in same or different regions of a network.</t>
          <t><xref target="fig-cats-components"/> shows two CATS nodes ("CATS-Forwarder 1" and "CATS-Forwarder 3") that provide access to service contact instances. These nodes behave as Egress CATS-Forwarders (<xref target="sec-ocr"/>).</t>
          <ul empty="true">
            <li>
              <t>Note: "Egress" is used here in reference to the direction of the service request placement. The directionality is called to explicitly identify the exit node of the CATS infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-csma">
          <name>CATS Service Metric Agent (C-SMA)</name>
          <t>The CATS Service Metric Agent (C-SMA) is a functional component that gathers information about service sites and server resources, as well as the status of the different service instances. The C-SMAs may be located adjacent to the service contact instances, co-located with service contact instances, hosted by the Egress CATS-Forwarders (<xref target="sec-ocr"/>), etc.</t>
          <t><xref target="fig-cats-components"/> shows one C-SMA embedded in "CATS-Forwarder 3", and another C-SMA that is adjacent to "CATS-Forwarder 1".</t>
        </section>
        <section anchor="sec-cnma">
          <name>CATS Network Metric Agent (C-NMA)</name>
          <t>The CATS Network Metric Agent (C-NMA) is a functional component that gathers information about the state of the underlay network. The C-NMAs may be implemented as standalone components or may be hosted by other components, such as CATS-Forwarders or CATS Path Selectors (C-PS) (<xref target="sec-cps"/>).</t>
          <t>C-NMA is likely to leverage existing techniques (e.g., <xref target="RFC7471"/>, <xref target="RFC8570"/>, and <xref target="RFC8571"/>).</t>
          <t><xref target="fig-cats-components"/> shows a single, standalone C-NMA within the underlay network. There may be one or more C-NMAs for an underlay network.</t>
        </section>
        <section anchor="sec-cps">
          <name>CATS Path Selector (C-PS)</name>
          <t>The C-SMAs and C-NMAs share the collected information with CATS Path Selectors (C-PSes) that use such information to select the Egress CATS-Forwarders (and potentially the service contact instances) where to forward traffic for a given service request. C-PSes also determine the best paths (possibly using tunnels) to forward traffic, according to various criteria that include network state and traffic congestion conditions. The collected information is encoded into one or more metrics that feed the C-PS path selection logic. Such an information also includes CS-ID and possibly CSCI-IDs.</t>
          <t>There might be one or more C-PSes used to select CATS paths in a CATS infrastructure.</t>
          <t>A C-PS can be integrated into CATS-Forwarders (e.g., "C-PS#1" in <xref target="fig-cats-components"/>) or may be deployed as a standalone component (e.g., "C-PS#2" in <xref target="fig-cats-components"/>). Generally, a standalone C-PS can be a functional component of a centralized controller (e.g., a Path Computation Element (PCE) <xref target="RFC4655"/>).</t>
        </section>
        <section anchor="sec-ctc">
          <name>CATS Traffic Classifier (C-TC)</name>
          <t>CATS Traffic Classifier (C-TC) is a functional component that is responsible for associating incoming packets from clients with existing service requests. CATS classifiers also ensure that packets that are bound to a specific service contact instance are all forwarded towards that same service contact instance, as instructed by a C-PS.</t>
          <t>CATS classifiers are typically hosted in CATS-Forwarders.</t>
        </section>
        <section anchor="sec-ocr">
          <name>Overlay CATS-Forwarders</name>
          <t>Egress CATS-Forwarders are the endpoints that behave as an overlay egress for service requests that are forwarded over a CATS infrastructure. A service site that hosts service instances may be connected to one or more Egress CATS-Forwarders (e.g., multi-homing design). If a C-PS has selected a specific service contact instance and the C-TC has marked the traffic with the CIS-ID related information, the Egress CATS-Forwarder then forwards traffic to the relevant service contact instance accordingly. In some cases, the choice of the service contact instance may be left open to the Egress CATS-Forwarder (i.e., traffic is marked only with the CS-ID). In such cases, the Egress CATS-Forwarder selects a service contact instance using its knowledge of service and network capabilities as well as the current load as observed by the CATS-Forwarder, among other considerations. Absent explicit policy, an Egress CATS-Forwarder must make sure to forward all packets that pertain to a given service request towards the same service contact instance.</t>
          <t>Note that, depending on the design considerations and service requirements, per-service  contact instance computing-related metrics or aggregated per-site computing related metrics (and a combination thereof) can be used by a C-PS. Using aggregated per-site computing related metrics appears as a preferred option scalability-wise, but relies on Egress CATS-Forwarders that connect to various service contact instances to select the proper service contact instance. An Egress CATS-Forwarder may choose to aggregate the metrics from different sites as well. In this case, the Egress CATS-Forwarder will choose the best site by itself when the packets arrive at it.</t>
        </section>
        <section anchor="underlay-infrastructure">
          <name>Underlay Infrastructure</name>
          <t>The "underlay infrastructure" in <xref target="fig-cats-components"/> indicates an IP and/or MPLS network that is not necessarily CATS-aware. The CATS paths that are computed by a C-PS will be distributed among the CATS-Forwarders (<xref target="sec-ocr"/>), and will not affect the underlay nodes. Underlay nodes are typically P routers (<xref section="5.3.1" sectionFormat="of" target="RFC4026"/>).</t>
        </section>
      </section>
      <section anchor="deployment-considerations">
        <name>Deployment Considerations</name>
        <t>This document does not make any assumption about how the various CATS functional elements are implemented and deployed. Concretely, whether a CATS deployment follows a fully distributed design or relies upon a mix of centralized (e.g., a C-PS) and distributed CATS functions (e.g., CATS traffic classifiers) is deployment-specific and may reflect the savoir-faire of the (CATS) service provider.</t>
        <t>For example, in a Centralized design, both the computing related metrics from the C-SMAs and the network metrics are collected by a (logically) centralized path computation logic (e.g., a PCE). In this case, the CATS computation logic may process incoming service requests to compute paths to service contact instances. More generally, the paths might be computed before the service request comes. Based on the metrics and computed paths, the C-PS can select the most appropriate path and then synchronize with CATS traffic classifiers (C-TCs).</t>
        <t>According to the method of distributing and collecting the computing related metrics, three deployment models can be considered for the deployment of the CATS framework:</t>
        <dl>
          <dt>Distributed model:</dt>
          <dd>
            <t>Computing metrics are distributed among network devices directly using distributed protocols without interactions with a centralized control plane. Service scheduling function is performed by the CATS forwarders in the distribution model, Therefore, the C-PS is integrated into an Ingress CATS-Forwarder.</t>
          </dd>
          <dt>Centralized model:</dt>
          <dd>
            <t>Computing metrics are collected by a centralized control plane, and then the centralized control plane computes the forwarding path for service requests and syncs up with the Ingress CATS-Forwarder. In this model, C-PS is implemented in the centralized control plane.</t>
          </dd>
          <dt>Hybrid model:</dt>
          <dd>
            <t>Is a combination of distribution and centralized models.</t>
          </dd>
          <dt/>
          <dd>
            <t>A part of computing metrics are distributed among involved network devices, and others may be collected by a centralized control plane. For example, some static information (e.g., capabilities information) can be distributed among network devices since they are quite stable. Frequent changing information (e.g., resource utilization) can be collected by a centralized control plane to avoid frequent flooding in the distributed control plane. Service scheduling function can be performed by a centralized control plane and/or the CATS forwarder. The entire or partial C-PS function may be implemented in the centralized control plane, depending on the specific implementation and deployment.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="cats-framework-workflow">
      <name>CATS Framework Workflow</name>
      <t>The following subsections provide an overview of how the CATS workflow operates.</t>
      <section anchor="provisioning-of-cats-components">
        <name>Provisioning of CATS Components</name>
        <t>TBC: --detail required provisioning at CAST elements (booptsrapping, credentials of peer CAST nodes, services, optimization metrics per service, etc.)--</t>
      </section>
      <section anchor="service-announcement">
        <name>Service Announcement</name>
        <t>A service is associated with a unique identifier called a CS-ID. A CS-ID may be a network identifier, such as an IP address. The mapping of CS-IDs to network identifiers may be learned through a name resolution service, such as DNS <xref target="RFC1034"/>.</t>
      </section>
      <section anchor="metrics-distribution">
        <name>Metrics Distribution</name>
        <t>As described in <xref target="sec-cats-arch"/>, a C-SMA collects both service-related capabilities and metrics, and associates them with a CS-ID that identifies the service. The C-SMA may aggregate the metrics for multiple service  contact  instances, or maintain them separately or both.</t>
        <t>The C-SMA then advertises CS-IDs along with metrics to related C-PSes in the network. Depending on deployment choice, CS-IDs with metrics may be distributed in different ways.</t>
        <t>For example, in a distributed model, CS-IDs with metrics can be distributed from the C-SMA to an Egress CATS Forwarder firstly and then be redistributed by the Egress CATS Forwarder to related C-PSes that are integrated into Ingress CATS Forwarders.</t>
        <t>In the centralized model, CS-IDs with metrics can be distributed from the C-SMA to a centralized control plane, for instance, a standalone C-PS.</t>
        <t>In the hybrid model, the metrics can be distributed to C-PSes in combination of distributed and centralized ways. The specific combination of metric distribution is an implementation choice, which is determined by the requirements of specific services.</t>
        <t>The service metrics include computing-related metrics and potentially other service-specific metrics like the number of end-users who access the service contact instance at any given time, their location, etc.</t>
        <t>Computing metrics may change very frequently (see <xref target="I-D.ietf-cats-usecases-requirements"/> for a discussion). How frequently such information is distributed is to be determined as part of the specification of any communication protocol (including routing protocols) that may be used to distribute the information. Various options can be considered, such as (but not limited to) interval-based updates, threshold-triggered updates, or policy-based updates.</t>
        <t>Additionally, the C-NMA collects network-related capabilities and metrics. These may be collected and distributed by existing measurement protocols and/or routing protocols, although extensions to such protocols may be required to carry additional information (e.g., link latency). The C-NMA distributes the network metrics to the C-PSes so that they can use the combination of service and network metrics to determine the best Egress CATS-Forwarder to provide access to a service contact instance and invoke the compute function required by a service request. Similar to service-related metrics, the network-related metrics can be distributed using distributed, centralized, or hybrid schemes. This document does not describe such details since this is a deployment-specific.</t>
        <t>Network metrics may also change over time. Dynamic routing protocols may take advantage of some information or capabilities to prevent the network from being flooded with state change information (e.g., Partial Route Computation (PRC) of OSPFv3 <xref target="RFC5340"/>). C-NMAs should also be configured or instructed like C-SMAs to determine when and how often updates should be notified to the C-PSes.</t>
        <t><xref target="fig-cats-example-overlay"/> shows an example of how CATS metrics can be disseminated in the distributed model. There is a client attached to the network via "CATS-Forwarder 1". There are three instances of the service with CS-ID "1": two are located at "Service Site 2" attached via "CATS-Forwarder 2" and have CSCI-IDs "1" and "2"; the third service contact instance is located at "Service Site 3" attached via "CATS-Forwarder 3" and with CSCI-ID "3". There is also a second service with CS-ID "2" with only one service contact instance located at "Service Site 2".</t>
        <t>In <xref target="fig-cats-example-overlay"/>, the C-SMA collocated with "CATS-Forwarder 2" distributes the service metrics for both service contact instances (i.e., (CS-ID 1, CSCI-ID 1) and (CS-ID 1, CSCI-ID 2)). Note that this information may be aggregated into a single advertisement, but in this case, the metrics for each service contact instance are indicated separately. Similarly, the C-SMA agent located at "Service Site 3" advertises the service metrics for the two services hosted by "Service Site 3".</t>
        <t>The service metric advertisements are processed by the C-PS hosted by "CATS-Forwarder 1". The C-PS also processes network metric advertisements sent by the C-NMA. All metrics are used by the C-PS to compute and select the most relevant path that leads to the Egress CATS-Forwarder according to the initial  client's service request, the service that is requested ("CS-ID 1" or "CS-ID 2"), the state of the service contact instances as reported by the metrics, and the state of the network.</t>
        <figure anchor="fig-cats-example-overlay">
          <name>An Example of CATS Metric Dessimination in a Distributed Model</name>
          <artwork><![CDATA[
          Service CS-ID 1, contact instance CSCI-ID 1 <metrics>
          Service CS-ID 1, contact instance CSCI-ID 2 <metrics>

                 :<----------------------:
                 :                       :               +---------+
                 :                       :               |CS-ID 1  |
                 :                       :            +--|CSCI-ID 1|
                 :              +----------------+    |  +---------+
                 :              |    C-SMA       |----|   Service Site 2
                 :              +----------------+    |  +---------+
                 :              |CATS-Forwarder 2|    +--|CS-ID 1  |
                 :              +----------------+       |CSCI-ID 2|
 +--------+      :                        |              +---------+
 | Client |      :  Network +----------------------+
 +--------+      :  metrics | +-------+            |
      |          : :<---------| C-NMA |            |
      |          : :        | +-------+            |
 +---------------------+    |                      |
 |CATS-Forwarder 1|C-PS|----|                      |
 +---------------------+    |       Underlay       |
                 :          |     Infrastructure   |     +---------+
                 :          |                      |     |CS-ID 1  |
                 :          +----------------------+ +---|CSCI-ID 3|
                 :                    |              |   +---------+
                 :          +----------------+  +-------+
                 :          |CATS-Forwarder 3|--| C-SMA | Service Site 3
                 :          +----------------+  +-------+
                 :                                :  |   +-------+
                 :                                :  +---|CS-ID 2|
                 :                                :      +-------+
                 :<-------------------------------:
          Service CS-ID 1, contact instance CSCI-ID 3 <metrics>
          Service CS-ID 2, <metrics>
]]></artwork>
        </figure>
        <t>The example in <xref target="fig-cats-example-overlay"/> mainly describes a per-instance computing-related metric distribution. In the case of distributing aggregated per-site computing-related metrics, the per-instance CSCI-ID information will not be included in the advertisement. Instead, a per-site CSCI-ID may be used in case multiple sites are connected to the Egress CATS-Forwarder to explicitly indicate the site from where the aggregated metrics come.</t>
        <t>If the CATS framework is implemented using a centralized model, the metric can be, e.g., distributed as illustrated in <xref target="fig-cats-centralized"/>.</t>
        <figure anchor="fig-cats-centralized">
          <name>An Example of CATS Metric Distribution in a Centralized Model</name>
          <artwork><![CDATA[
                        Service CS-ID 1, instance CSCI-ID 1 <metrics>
                        Service CS-ID 1, instance CSCI-ID 2 <metrics>
                        Service CS-ID 1, instance CSCI-ID 3 <metrics>
                        Service CS-ID 2, <metrics>

             :       +------+
             :<------| C-PS |<-----------------------------------+
             :       +------+ <------+              +---------+  |
             :          ^            |           +--|CS-ID 1  |  |
             :          |            |           |  |CSCI-ID 1|  |
             :          |   +----------------+   |  +---------+  |
             :          |   |    C-SMA       |---|Service Site 2 |
             :          |   +----------------+   |  +---------+  |
             :          |   |CATS-Forwarder 2|   +--|CS-ID 1  |  |
             :          |   +----------------+      |CSCI-ID 2|  |
 +--------+  :          |             |             +---------+  |
 | Client |  :  Network |   +----------------------+             |
 +--------+  :  metrics |   | +-------+            |             |
      |      :          +-----| C-NMA |            |      +-----+
      |      :          |   | +-------+            |      |C-SMA|<-+
 +----------------+ <---+   |                      |      +-----+  |
 |CATS-Forwarder 1|---------|                      |          ^    |
 +----------------+         |       Underlay       |          |    |
             :              |     Infrastructure   |    +---------+|
             :              |                      |    |CS-ID 1  ||
             :              +----------------------+  +-|CSCI-ID 3||
             :                        |               | +---------+|
             :          +----------------+------------+            |
             :          |CATS-Forwarder 3|         Service Site 3  |
             :          +----------------+                         |
             :                        |       :      +-------+     |
             :                        +-------:------|CS-ID 2|-----+
             :                                :      +-------+
             :<-------------------------------:
      Service CS-ID 1, contact instance CSCI-ID 3
      Service CS-ID 2
]]></artwork>
        </figure>
        <t>If the CATS framework is implemented using an hybrid model, the metric can be distributed, e.g., as illustrated in the <xref target="fig-cats-hybrid"/>. For example, the metrics 1,2,3 associated with the CS-ID1 are collected by the centralized C-PS, and the metrics 4 and 5 are distributed via distributed protocols to the ingress CATS-Forwarder directly. For a service with CS-ID2, all the metrics are collected by the centralized C-PS. The CATS-computed path result will be distributed to the Ingress CATS-Forwarders from the C-PS by considering both the metrics from the C-SMA and C-NMA. Furthermore, the Ingress CATS-Forwarder may also have some ability to compute the path for the subsequent service accessing packets.</t>
        <figure anchor="fig-cats-hybrid">
          <name>An Example of CATS Metric Distribution in Hybrid Model</name>
          <artwork><![CDATA[
                   Service CS-ID 1, instance CSCI-ID 1 <metric 1,2,3>
                   Service CS-ID 1, instance CSCI-ID 2 <metric 1,2,3>
                   Service CS-ID 1, instance CSCI-ID 3 <metric 1,2,3>
                   Service CS-ID 2, <metrics>

             :       +------+
             :<------| C-PS |<-----------------------------------+
             :       +------+ <------+              +---------+  |
             :          ^            |           +--|CS-ID 1  |  |
             :          |            |           |  |CSCI-ID 1|  |
             :          |   +----------------+   |  +---------+  |
             :          |   |    C-SMA       |---|Service Site 2 |
             :          |   +----------------+   |  +---------+  |
             :          |   |CATS-Forwarder 2|   +--|CS-ID 1  |  |
             :          |   +----------------+      |CSCI-ID 2|  |
 +--------+  :          |             |             +---------+  |
 | Client |  :  Network |   +----------------------+             |
 +--------+  :  metrics |   | +-------+            |             |
      |      :          +-----| C-NMA |            |      +-----+
      |      :          |   | +-------+            |      |C-SMA|<-+
 +----------------+ <---+   |                      |      +-----+  |
 |CATS-Forwarder 1|---------|                      |          ^    |
 |----------------+         |       Underlay       |          |    |
 |C-PS|      :              |     Infrastructure   |    +---------+|
 +----+      :              |                      |    |CS-ID 1  ||
             :              +----------------------+  +-|CSCI-ID 3||
             :                        |               | +---------+|
             :          +----------------+------------+            |
             :          |CATS-Forwarder 3|         Service Site 3  |
             :          +----------------+                         |
             :                        |       :      +-------+     |
             :                        +-------:------|CS-ID 2|-----+
             :                                :      +-------+
             :<-------------------------------:
      Service CS-ID 1, contact instance CSCI-ID 3, <metric 4,5>
      Service CS-ID 2
]]></artwork>
        </figure>
      </section>
      <section anchor="service-access-processing">
        <name>Service Access Processing</name>
        <t>A C-PS selects paths that lead to Egress CATS-Forwarders according to both service and network metrics that were advertised. A C-PS may be collocated with an Ingress CATS-Forwarder (as shown in <xref target="fig-cats-example-overlay"/>) or logically centralized (in a centralized model or hybrid model).</t>
        <t>This document does not specify any particular algorithm for path selection purposes to be supported by C-PSes in order to not constrain the CATS framework to one possible selection only. Instead, it is expected that a service request or local policy may feed the C-PS with appropriate information on that selection logic that takes the suitable metric information as input and the selected service contact instance as output. Such "appropriate information" may be utilized to differentiate selection mechanisms to enable service-specific selections.</t>
        <t>In the example shown in  <xref target="fig-cats-example-overlay"/>, the client sends a service access via the network through the "CATS-Forwarder 1", which is an Ingress CATS-Forwarder. Note that, a service access may consist of one or more service packets (e.g., Session Initiation Protocol (SIP) <xref target="RFC3261"/>, HTTP <xref target="RFC9112"/>, IPv6 <xref target="RFC8200"/>, SRv6 <xref target="RFC8754"/> or Real-Time Streaming Protocol (RTSP) <xref target="RFC7826"/>) that carry the CS-ID and potential parameters. The Ingress CATS-Forwarder classifies the packets using the information provided by the CATS classifier (C-TC). When a matching classification entry is found for the packets, the Ingress CATS-Forwarder encapsulates and forwards them to the C-PS selected Egress CATS-Forwarder. When these packets reach the Egress CATS-Forwarder, the outer header of the possible overlay encapsulation will be removed and the inner packets will be sent to the relevant service contact instance.</t>
        <ul empty="true">
          <li>
            <t>Note that multi-homed clients may be connected to multiple CATS infrastructures that may be operated by the same or distinct service providers. This version of the framework does not cover multihoming specifics.</t>
          </li>
        </ul>
      </section>
      <section anchor="service-contact-instance-affinity">
        <name>Service Contact Instance Affinity</name>
        <t>Instance affinity means that packets that belong to a flow associated with a service should always be sent to the same service contact instance. Furthermore, packets of a given flow should be forwarded along the same path to avoid mis-ordering and to prevent the introduction of unpredictable latency variations. Specifically, the same Egress CATS-Forwarder may be solicited to forward the packets.</t>
        <t>The affinity is configured on the C-PS when the service is deployed, or is determined at the time of newly formulated service requests.</t>
        <t>Note that different services may have different notions of what constitutes a 'flow' and may, thus, identify a flow differently. Typically, a flow is identified by the 5-tuple transport coordinates (source and destination addresses, source and destination port numbers, and protocol). However, for instance, an RTP video stream may use different port numbers for video and audio channels: in that case, affinity may be identified as a combination of the two 5-tuple flow identifiers so that both flows are addressed to the same service contact instance.</t>
        <t>Hence, when specifying a protocol to communicate information about service contact instance affinity, a certain level of flexibility for identifying flows should be supported. Or, from a more general perspective, there should be a flexible mechanism to specify and identify the set of packets that are subject to a service contact instance affinity.</t>
        <t>More importantly, the means for identifying a flow for the purpose of ensuring instance affinity should be application-independent to avoid the need for service-specific instance affinity methods. However, service contact instance affinity information may be configurable on a per-service basis. For each service, the information can include the flow/packets identification type and means, affinity timeout value, etc.</t>
        <t>This document does not define any mechanism for defining or enforcing service contact instance affinity.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The computing resource information changes over time very frequently, especially with the creation and termination of service contact instances. When such an information is carried in a routing protocol, too many updates may affect network stability. This issue could be exploited by an attacker (e.g., by spawning and deleting service contact instances very rapidly). CATS solutions must support guards against such misbehaviors. For example, these solutions should support aggregation techniques, dampening mechanisms, and threshold-triggered distribution updates.</t>
      <t>The information distributed by the C-SMA and C-NMA agents may be sensitive. Such information could indeed disclose intel about the network and the location of compute resources hosted in service sites. This information may be used by an attacker to identify weak spots in an operator's network. Furthermore, such information may be modified by an attacker resulting in disrupted service delivery for the clients, up to and including misdirection of traffic to an attacker's service implementation. CATS solutions must support authentication and integrity-protection mechanisms between C-SMAs/C-NMAs and C-PSes, and between C-PSes and Ingress CATS-Forwarders. Also, C-SMA agents need to support a mechanism to authenticate the services for which they provide information to C-PS computation logics, among other CATS functions.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Means to prevent that on-path nodes in the underlay infrastructure to fingerprint and track clients (e.g., determine which client accesses which service) must be supported by CATS solutions. More generally, personal data must not be exposed to external parties by CATS beyond what is carried in the packet that was originally issued by the client.</t>
      <t>In some cases, the service will need to know about applications, clients, and even user identity. This information is sensitive and should be encrypted. To prevent the information leaking, if the client/service communication is not already encrypted, the the C-PS computed path information should be encrypted.</t>
      <t>For more discussion about privacy, refer to <xref target="RFC6462"/> and <xref target="RFC6973"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests for IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="I-D.ietf-cats-usecases-requirements">
        <front>
          <title>Computing-Aware Traffic Steering (CATS) Problem Statement, Use Cases, and Requirements</title>
          <author fullname="Kehan Yao" initials="K." surname="Yao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Dirk Trossen" initials="D." surname="Trossen">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Hang Shi" initials="H." surname="Shi">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Yizhou Li" initials="Y." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Shuai Zhang" initials="S." surname="Zhang">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Qing An" initials="Q." surname="An">
            <organization>Alibaba Group</organization>
          </author>
          <date day="3" month="July" year="2024"/>
          <abstract>
            <t>   Distributed computing is a tool that service providers can use to
   achieve better service response time and optimized energy
   consumption.  In such a distributed computing environment, providing
   services by utilizing computing resources hosted in various computing
   facilities aids support of services such as computationally intensive
   and delay sensitive services.  Ideally, compute services are balanced
   across servers and network resources to enable higher throughput and
   lower response times.  To achieve this, the choice of server and
   network resources should consider metrics that are oriented towards
   compute capabilities and resources instead of simply dispatching the
   service requests in a static way or optimizing solely on connectivity
   metrics.  The process of selecting servers or service instance
   locations, and of directing traffic to them on chosen network
   resources is called "Computing-Aware Traffic Steering" (CATS).

   This document provides the problem statement and the typical
   scenarios for CATS, which shows the necessity of considering more
   factors when steering traffic to the appropriate computing resource
   to best meet the customer's expectations and deliver the requested
   service.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cats-usecases-requirements-03"/>
      </reference>
      <reference anchor="I-D.ietf-teas-rfc3272bis">
        <front>
          <title>Overview and Principles of Internet Traffic Engineering</title>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <date day="12" month="August" year="2023"/>
          <abstract>
            <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-27"/>
      </reference>
      <reference anchor="RFC7471">
        <front>
          <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
          <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <author fullname="J. Drake" initials="J." surname="Drake"/>
          <author fullname="A. Atlas" initials="A." surname="Atlas"/>
          <author fullname="S. Previdi" initials="S." surname="Previdi"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
            <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
            <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7471"/>
        <seriesInfo name="DOI" value="10.17487/RFC7471"/>
      </reference>
      <reference anchor="RFC8570">
        <front>
          <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
          <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
          <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <author fullname="J. Drake" initials="J." surname="Drake"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
            <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
            <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
            <t>This document obsoletes RFC 7810.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8570"/>
        <seriesInfo name="DOI" value="10.17487/RFC8570"/>
      </reference>
      <reference anchor="RFC8571">
        <front>
          <title>BGP - Link State (BGP-LS) Advertisement of IGP Traffic Engineering Performance Metric Extensions</title>
          <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
          <author fullname="S. Previdi" initials="S." surname="Previdi"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>This document defines new BGP - Link State (BGP-LS) TLVs in order to carry the IGP Traffic Engineering Metric Extensions defined in the IS-IS and OSPF protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8571"/>
        <seriesInfo name="DOI" value="10.17487/RFC8571"/>
      </reference>
      <reference anchor="RFC4655">
        <front>
          <title>A Path Computation Element (PCE)-Based Architecture</title>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
          <author fullname="J. Ash" initials="J." surname="Ash"/>
          <date month="August" year="2006"/>
          <abstract>
            <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
            <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4655"/>
        <seriesInfo name="DOI" value="10.17487/RFC4655"/>
      </reference>
      <reference anchor="RFC4026">
        <front>
          <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson"/>
          <author fullname="T. Madsen" initials="T." surname="Madsen"/>
          <date month="March" year="2005"/>
          <abstract>
            <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
            <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4026"/>
        <seriesInfo name="DOI" value="10.17487/RFC4026"/>
      </reference>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5340">
        <front>
          <title>OSPF for IPv6</title>
          <author fullname="R. Coltun" initials="R." surname="Coltun"/>
          <author fullname="D. Ferguson" initials="D." surname="Ferguson"/>
          <author fullname="J. Moy" initials="J." surname="Moy"/>
          <author fullname="A. Lindem" initials="A." surname="Lindem"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>This document describes the modifications to OSPF to support version 6 of the Internet Protocol (IPv6). The fundamental mechanisms of OSPF (flooding, Designated Router (DR) election, area support, Short Path First (SPF) calculations, etc.) remain unchanged. However, some changes have been necessary, either due to changes in protocol semantics between IPv4 and IPv6, or simply to handle the increased address size of IPv6. These modifications will necessitate incrementing the protocol version from version 2 to version 3. OSPF for IPv6 is also referred to as OSPF version 3 (OSPFv3).</t>
            <t>Changes between OSPF for IPv4, OSPF Version 2, and OSPF for IPv6 as described herein include the following. Addressing semantics have been removed from OSPF packets and the basic Link State Advertisements (LSAs). New LSAs have been created to carry IPv6 addresses and prefixes. OSPF now runs on a per-link basis rather than on a per-IP-subnet basis. Flooding scope for LSAs has been generalized. Authentication has been removed from the OSPF protocol and instead relies on IPv6's Authentication Header and Encapsulating Security Payload (ESP).</t>
            <t>Even with larger IPv6 addresses, most packets in OSPF for IPv6 are almost as compact as those in OSPF for IPv4. Most fields and packet- size limitations present in OSPF for IPv4 have been relaxed. In addition, option handling has been made more flexible.</t>
            <t>All of OSPF for IPv4's optional capabilities, including demand circuit support and Not-So-Stubby Areas (NSSAs), are also supported in OSPF for IPv6. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5340"/>
        <seriesInfo name="DOI" value="10.17487/RFC5340"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC9112">
        <front>
          <title>HTTP/1.1</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
            <t>This document obsoletes portions of RFC 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="99"/>
        <seriesInfo name="RFC" value="9112"/>
        <seriesInfo name="DOI" value="10.17487/RFC9112"/>
      </reference>
      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering"/>
          <author fullname="R. Hinden" initials="R." surname="Hinden"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="RFC8754">
        <front>
          <title>IPv6 Segment Routing Header (SRH)</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
          <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
          <author fullname="S. Previdi" initials="S." surname="Previdi"/>
          <author fullname="J. Leddy" initials="J." surname="Leddy"/>
          <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
          <author fullname="D. Voyer" initials="D." surname="Voyer"/>
          <date month="March" year="2020"/>
          <abstract>
            <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8754"/>
        <seriesInfo name="DOI" value="10.17487/RFC8754"/>
      </reference>
      <reference anchor="RFC7826">
        <front>
          <title>Real-Time Streaming Protocol Version 2.0</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="A. Rao" initials="A." surname="Rao"/>
          <author fullname="R. Lanphier" initials="R." surname="Lanphier"/>
          <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
          <author fullname="M. Stiemerling" initials="M." role="editor" surname="Stiemerling"/>
          <date month="December" year="2016"/>
          <abstract>
            <t>This memorandum defines the Real-Time Streaming Protocol (RTSP) version 2.0, which obsoletes RTSP version 1.0 defined in RFC 2326.</t>
            <t>RTSP is an application-layer protocol for the setup and control of the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Sources of data can include both live data feeds and stored clips. This protocol is intended to control multiple data delivery sessions; provide a means for choosing delivery channels such as UDP, multicast UDP, and TCP; and provide a means for choosing delivery mechanisms based upon RTP (RFC 3550).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7826"/>
        <seriesInfo name="DOI" value="10.17487/RFC7826"/>
      </reference>
      <reference anchor="RFC6462">
        <front>
          <title>Report from the Internet Privacy Workshop</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <date month="January" year="2012"/>
          <abstract>
            <t>On December 8-9, 2010, the IAB co-hosted an Internet privacy workshop with the World Wide Web Consortium (W3C), the Internet Society (ISOC), and MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL). The workshop revealed some of the fundamental challenges in designing, deploying, and analyzing privacy-protective Internet protocols and systems. Although workshop participants and the community as a whole are still far from understanding how best to systematically address privacy within Internet standards development, workshop participants identified a number of potential next steps. For the IETF, these included the creation of a privacy directorate to review Internet-Drafts, further work on documenting privacy considerations for protocol developers, and a number of exploratory efforts concerning fingerprinting and anonymized routing. Potential action items for the W3C included investigating the formation of a privacy interest group and formulating guidance about fingerprinting, referrer headers, data minimization in APIs, usability, and general considerations for non-browser-based protocols.</t>
            <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect the views of the IAB, W3C, ISOC, or MIT CSAIL. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6462"/>
        <seriesInfo name="DOI" value="10.17487/RFC6462"/>
      </reference>
      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
      <reference anchor="I-D.yao-cats-awareness-architecture">
        <front>
          <title>Computing and Network Information Awareness (CNIA) system architecture for CATS</title>
          <author fullname="Huijuan Yao" initials="H." surname="Yao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="xuewei wang" initials="X." surname="wang">
            <organization>Ruijie Networks</organization>
          </author>
          <author fullname="Zhiqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Daniel Huang" initials="D." surname="Huang">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <date day="22" month="October" year="2023"/>
          <abstract>
            <t>   This document describes a Computing and Network Information
   Awareness (CNIA)system architecture for Computing-Aware Traffic
   Steering (CATS). Based on the CATS framework, this document further
   describes a proposal detailed awareness architecture about the
   network information and computing information. It includes a new
   component and the corresponding interfaces and workflows in the CATS
   control plane.



            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-yao-cats-awareness-architecture-02"/>
      </reference>
    </references>
    <?line 581?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Joel Halpern, John Scudder, Dino Farinacci, Adrian Farrel,
Cullen Jennings, Linda Dunbar, Jeffrey Zhang, Peng Liu, Fang Gao, Aijun Wang, Cong Li,
Xinxin Yi, Jari Arkko, Mingyu Wu, Haibo Wang, Xia Chen, Jianwei Mao, Guofeng Qian, Zhenbin Li,
Xinyue Zhang, Weier Li, and Nagendra Kumar for their comments and suggestions.</t>
      <t>Some text about various deployment models was originally documented in <xref target="I-D.yao-cats-awareness-architecture"/>.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="G." surname="Huang" fullname="Guangping Huang">
        <organization>ZTE</organization>
        <address>
          <email>huang.guangping@zte.com.cn</email>
        </address>
      </contact>
      <contact initials="G." surname="Mishra" fullname="Gyan Mishra">
        <organization>Verizon Inc.</organization>
        <address>
          <email>hayabusagsm@gmail.com</email>
        </address>
      </contact>
      <contact initials="H." surname="Yao" fullname="Huijuan Yao">
        <organization>China Mobile</organization>
        <address>
          <email>yaohuijuan@chinamobile.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Li" fullname="Yizhou Li">
        <organization>Huawei Technologies</organization>
        <address>
          <email>liyizhou@huawei.com</email>
        </address>
      </contact>
      <contact initials="D." surname="Trossen" fullname="Dirk Trossen">
        <organization>Huawei Technologies</organization>
        <address>
          <email>dirk.trossen@huawei.com</email>
        </address>
      </contact>
      <contact initials="L." surname="Iannone" fullname="Luigi Iannone">
        <organization>Huawei Technologies</organization>
        <address>
          <email>luigi.iannone@huawei.com</email>
        </address>
      </contact>
      <contact initials="H." surname="Shi" fullname="Hang Shi">
        <organization>Huawei Technologies</organization>
        <address>
          <email>shihang9@huawei.com</email>
        </address>
      </contact>
      <contact initials="C." surname="Lin" fullname="Changwang Lin">
        <organization>New H3C Technologies</organization>
        <address>
          <email>linchangwang.04414@h3c.com</email>
        </address>
      </contact>
      <contact initials="X." surname="Wang" fullname="Xueshun Wang">
        <organization>CICT</organization>
        <address>
          <email>xswang@fiberhome.com</email>
        </address>
      </contact>
      <contact initials="X." surname="Wang" fullname="Xuewei Wang">
        <organization>Ruijie Networks</organization>
        <address>
          <email>wangxuewei1@ruijie.com.cn</email>
        </address>
      </contact>
      <contact initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
        <organization>Orange</organization>
        <address>
          <email>christian.jacquenet@orange.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
