Application-Responsive Network Framework
draft-yang-rtgwg-arn-framework-05
This document is an Internet-Draft (I-D).
Anyone may submit an I-D to the IETF.
This I-D is not endorsed by the IETF and has no formal standing in the
IETF standards process.
| Document | Type | Active Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Feng Yang , Changwang Lin | ||
| Last updated | 2025-12-25 | ||
| RFC stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats | |||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | I-D Exists | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
draft-yang-rtgwg-arn-framework-05
RTGWG F. Yang
Internet-Draft China Mobile
Intended status: Standards Track C. Lin
Expires: 29 June 2026 New H3C Technologies
26 December 2025
Application-Responsive Network Framework
draft-yang-rtgwg-arn-framework-05
Abstract
With the deployment of increasingly advanced technologies on a large
scale, such as SRv6 and network slicing, there is a growing need to
expose these new capabilities to applications. The current practice
involves using ACLs to classify packets and then map the traffic onto
appropriate network resources. This approach results in the
application being passively perceived by the network, rather than the
application actively interfacing with the network. Furthermore,
changes in application characteristics necessitate triggering network
configuration adjustments, making it challenging to deploy at scale.
The document proposes a new framework called Application Responsive
Network (ARN), by encapsulating more network functions into ARN ID,
thus it opens up interfaces to applications. The vision is to enable
applications to access network resources like they access an
operating system.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 29 June 2026.
Yang & Lin Expires 29 June 2026 [Page 1]
Internet-Draft ARN Framework December 2025
Copyright Notice
Copyright (c) 2025 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Requirements Language . . . . . . . . . . . . . . . . . . 4
1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
2. Gaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Design Goal . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. ARN Framework and Components . . . . . . . . . . . . . . . . 6
4.1. ARN ID . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2. Application . . . . . . . . . . . . . . . . . . . . . . . 7
4.3. User Edge Device . . . . . . . . . . . . . . . . . . . . 8
4.3.1. ARN ID Marking . . . . . . . . . . . . . . . . . . . 8
4.4. Network Edge Device . . . . . . . . . . . . . . . . . . . 8
4.4.1. Ingress Processing . . . . . . . . . . . . . . . . . 9
4.4.2. Egress Processing . . . . . . . . . . . . . . . . . . 9
4.4.3. Access Control . . . . . . . . . . . . . . . . . . . 9
4.4.4. Cross-domain Aggregation and Mapping . . . . . . . . 10
4.4.5. Service Funtion Chain Based on ARN . . . . . . . . . 10
4.4.6. Rate Limiting . . . . . . . . . . . . . . . . . . . . 11
4.5. Controller . . . . . . . . . . . . . . . . . . . . . . . 11
4.6. The Southbound Interface (SBI) of the Controller . . . . 11
5. ARN Encapsulation . . . . . . . . . . . . . . . . . . . . . . 11
5.1. Locations for IPv6 ARN . . . . . . . . . . . . . . . . . 12
5.2. Locations for IPv4 ARN . . . . . . . . . . . . . . . . . 12
6. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 12
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
8. Security Considerations . . . . . . . . . . . . . . . . . . . 14
9. Normative References . . . . . . . . . . . . . . . . . . . . 14
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15
Yang & Lin Expires 29 June 2026 [Page 2]
Internet-Draft ARN Framework December 2025
1. Introduction
With the widespread application of new technologies such as 5G, cloud
computing, big data, and AI, network traffic patterns are becoming
increasingly complex and diversified. Various emerging services have
higher requirements for QoS parameters such as network latency,
bandwidth, jitter, and packet loss.
Networks typically need to prioritize critical services. For
example, in office networks, video conferencing requires network
priority to ensure that video and voice services do not experience
buffering and excessive delays. However, the applications used for
video and voice services may vary in different industries and office
network scenarios, so it is necessary to identify these applications
to further ensure the quality of service.
Some specific services have explicit SLA (Service Level Agreement)
requirements. In business scenarios such as autonomous driving,
industrial control, and remote control, there are clear SLA
requirements for the network, such as latency not exceeding 50ms and
jitter not exceeding 1ms.
In traditional IP networks, ACLs are typically used on critical
network devices to implement application identification and policy
configuration. Based on packet characteristics such as the five-
tuple, network can provide guaranteed service for specific users or
applications. Different network services have their own ACL matching
entries and policies, which need to be continuously adjusted as
services evolve. Over time, configurations become invalid due to not
being revoked or modified in a timely manner. This is not sufficient
for general solution.
This article proposes a new framework called Application Responsive
Network (ARN), which abstracts and represents personalized network
services based on user demand awareness, provided through ARN Service
identifiers (ARN IDs). Network services can be encapsulated by ARN
IDs, thus it can be called by user. The vision is to enable
applications to access network resources like they access an
operating system.
The application here can be network service implemented on a gateway
or software that can program the ARN ID.
Yang & Lin Expires 29 June 2026 [Page 3]
Internet-Draft ARN Framework December 2025
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
1.2. Terminology
ARN: Application-Responsive Networking
ACL: Access Control List
Subscriber: the user who subscribed a network service, which can be
represented by an ARN ID
2. Gaps
There are still the following key gaps in current network technology:
Application-aware features. It is necessary to provide
differentiated services based on the different services of the same
user. For example, video conferencing needs to avoid stuttering or
screen tearing due to congestion and packet loss to ensure a customer
experience, while general web browsing services can strive for the
best.
Data plane programming capabilities. Identify and classify user
application data, and transfer it to the appropriate service-level
tunnel based on the results.
Ability to perceive the user experience. Through real-time detection
and perception of user-level service experience, it works with
intelligent routing to ensure service assurance for high-priority
services. Currently, there is a lack of traffic identification for
rapid classification and statistical analysis of the user experience
of this type of traffic.
Ability to prevent leakage of network services. The security of the
access network is relatively poor, and there is a risk of leakage of
information related to user applications.
Yang & Lin Expires 29 June 2026 [Page 4]
Internet-Draft ARN Framework December 2025
3. Design Goal
As shown in Figure 1, an ARN intermediate layer is added between the
application and the network, mapping is accomplished using ARN IDs.
The ARN ID is a simple number that encapsulates network capabilities
internally and hides network information externally, thus avoiding
the exposure of application privacy and facilitating user application
invocation.
+---+
+-----+ | A | +-------+
|App |--->| R |--->|Network|
+-----+ | N | +-------+
+---+
Figure 1: ARN Intermediate Layer Diagram
ARN Network Design Goals:
* Opening network services.
One of the design principles of ARN is to open and program network
capabilities based on the data plane. By opening programming
interfaces on the data plane in a software-based manner, applications
can call network resources like calling an operating system. In
today's digital world, user demands for the network far exceed simple
connectivity functions. Users expect the network to provide stable,
high-speed connections to meet diverse application requirements.
Even for the same type of application, usage requirements may vary
across different industries and scenarios. Allowing applications to
call on network capabilities through data plane programming provides
corresponding guarantees for different types of packets.
* Decoupling of addresses and services.
Another design principle of ARN is to decouple addresses and
services. Traditional network design is based on addresses, managing
and routing based on destination addresses to determine the
forwarding services provided by the network. However, with the
increasing variety of user applications, relying on addresses to
carry service levels has made network management increasingly
complex. Therefore, it is necessary to manage and optimize the
network based on the characteristics and requirements of user
applications, separating addresses from services to provide
multidimensional forwarding services.
* Decoupling of network and applications.
Yang & Lin Expires 29 June 2026 [Page 5]
Internet-Draft ARN Framework December 2025
The third design principle of ARN is to decouple the network and
applications. By adding an ARN layer between the network and
applications, the network does not need to directly perceive the
applications, thus shielding the diversity of applications and
preventing direct access to network capabilities. Through ARN, the
network and applications can be encapsulated separately, achieving
application privacy and the concealment of internal network
information. At the same time, based on this encapsulation, access
control can be implemented during the application's network calls,
realizing an authorization token-based calling mechanism similar to
software programming.
* Unified abstraction of network resources.
The fourth design principle of ARN is the unified abstraction of
multiple network resources. With the development of personalized and
diversified network services, the network resources used in
forwarding user packets are becoming increasingly rich, such as
computing power, network slicing, service chaining, and more. During
the use of these network resources, additional identifiers are often
carried in the packets to determine the mapping relationship between
users or applications and network resources, or ACLs are used to
parse and match the feature information in the packet to determine
the associated network resources. In the ARN network, multiple
network resources can be uniformly represented by ARN IDs, reducing
the complexity of data plane identifiers and simplifying operational
deployments.
4. ARN Framework and Components
ARN Framework, as illustrated in Figure 2, consists of key components
including user edge devices, network edge devices, and network
controllers at different levels.
+--------------------------+
| Controller |
+-+----------+----------+--+
| | |
|SBI | SBI |
+----+ +--+--+ +--+--+ +--+--+ +-------+
|App |--->|User |--->| | | | | |
+----+ |Edge | | Net | | Net | | Cloud |
+-----+ | work|--->| work|--->| |
+----+ | Edge| | Edge| |Service|
|App |-------------->| | | | | |
+----+ +-----+ +-----+ +-------+
Access Backbone
Yang & Lin Expires 29 June 2026 [Page 6]
Internet-Draft ARN Framework December 2025
Figure 2: Framework and Key Components
4.1. ARN ID
The ARN ID can be generated by the controller based on the user
service subscription information and network service information, and
the generated ARN ID will be configured to both user edge devices and
network edge devices. User service subscription information may
include user information, e.g. PPPoE, and application information,
e.g. 5 tuple. The network service information can be pre-planed
network pathes, e.g. SR policies.
The ARN ID represents the application's invocation of network
capabilities and/or the network's ability to be open to the
application.
The ARN ID also represents a contractual relationship, and therefore
requires lifecycle management of ARN ID, e.g., revocation, loss
reporting, replacing, aging, and deferring operations.
A method of allocating ARN ID by PPPoE mechanism is as follows:
Firstly, the user edge device such as BRAS sends the configuration
request used to query ARN ID which characterizes a service subscribed
by a user. The request includes at least one or more of protocol
typr, protocol length, and service id based on the pre-set protocol.
The network device connected to the user device receives the request
according to the pre-set protocol(e.g. NCP) and allocates the
configuration with ARN ID to the user device based on the request.
According to pre-set service information including service type and
identification information of user device, network device determines
the service type of user device. Furthermore, it determines ARN ID
of the user device based on the said service type information.
Secondly, the user device sends the configuration request with ARN ID
to confirm that the ARN ID is correct. The network device receives
the message and sends the confirmation message to the user device
based on the confirmation request, which is used to characterize
whether ARN ID is correct. When the ARN ID in the configuration
request sended from the user device is matching the ARN ID in the
congfiguration information sended from the network device, the
network device sends the confirmation message characterizing tha
accuracy of ARN ID which is allocated to the user device.
4.2. Application
User applications require networks to provide differentiated
services, especially those based on SR technology. There are two
scenarios.
Yang & Lin Expires 29 June 2026 [Page 7]
Internet-Draft ARN Framework December 2025
The first scenario is that the user's application supports ARN. By
delivering ARN ID to user, user can encapsulate ARN ID for certain
application to achieve differentiated services. In this case, the
application needs to insert the ARN ID into the extension header of
the IPv6 packet.
The second scenario is that the user's application does not support
ARN. In this case, network service provider needs to deliver ARN ID
to user edge device and map application traffic to the ARN ID to
achieve differentiated services.
4.3. User Edge Device
The user edge devices are responsible for accessing the user
applications and are the boundary of the access network. The access
network will not be a part of SRv6 or MPLS domains.
The ARN IDs are configured between the user edge device and the
network edge device, and the controller only needs to ensure that the
ARN ID generated based on different user subscription information and
network service information is unique within this range.
4.3.1. ARN ID Marking
The user edge device will identify the relevant IP traffic and mark
the packet based on the received ARN ID, and then transmits it to
network edge device.The ARN ID may be encapsulated into the extension
header of the IPv6 packet, which will be explained in detail in
Section 5. In this case, an extra IPv6 header is needed.
4.4. Network Edge Device
The network edge devices aggregate the traffic from access network,
which is the edge of the backbone network. The backbone network runs
SRv6 and MPLS.
The network edge device is the boundary of the backbone network,
which is the starting point of network service, e.g. tunnels such as
SR Policies with various characteristics. Of course, SR Policies are
pre-planned by the network operator. The network edge devices will
receive both ARN IDs and the mapping of ARN IDs to those pre-planed
tunnels from the network controller.
If network edge device is PE, it is desired that VPN services are
carried by multiple SRv6 Policies with different color. In this
case, the ARN ID in the packet from user can be used to select the
appropriate SRv6 Policy.
Yang & Lin Expires 29 June 2026 [Page 8]
Internet-Draft ARN Framework December 2025
4.4.1. Ingress Processing
The processing of ARN occurs on the edge devices at the boundary of
the ARN domain. When external packets with ARN ID enter the ARN
domain, they will be mapped to SRv6 Policy or slice through the ARN
Ingress mapping table. At this point, the ARN ID can be considered
as the Color of the data plane, corresponding to the Color of the
SRv6 Policy.
4.4.2. Egress Processing
When packets leave the ARN domain, the SRv6 Policy can also be mapped
to the ARN ID of the next domain. Like ingress processing, there
will be an egress mapping table. The mapping operation is quite
similar to VLAN translation.
4.4.3. Access Control
Before trusting the incoming ARN ID of the packet outside limited
domain, verification is necessary.
The user facing interface should support configuration option to
enable or disable the ARN function. When a network edge device
receives a packet carrying an ARN ID, if the ARN function on the
interface is enabled, it should perform ARN related access control
and forwarding processing on the packet. If the ARN function on the
interface is disabled, the ARN ID in the packet should be ignored,
that is, the processing associated with ARN should be skipped.
The received packet contains source information of the packet, such
as source address, PPPoE, tunnel, and other information, which is
used to identify subscribers. When the ARN function is enabled on
the interface, access control verification can be performed based on
the sender's information and the ARN ID in the packet; after
successful verification, forwarding is carried out based on the ARN
ID.
If the verification is failed, the ARN ID in the packet should be
ignored, that is, the processing associated with ARN should be
skipped.
Access control requires a pre-configured ARN ID verification table to
verify the source information and ARN ID in the packet. The ARN ID
verification table is pre-populated with the following information:
* The source information of the packet, which represents the
subscriber.
Yang & Lin Expires 29 June 2026 [Page 9]
Internet-Draft ARN Framework December 2025
* The subscribed ARN ID.
* The mapping relationship between the ARN ID and network services
(such as SR Policy/Flex Algo).
This table is used to verify the source information and ARN ID in the
packet. If ARN ID is valid, the network edge device will perform
path mapping function and rate limiting, then do packet forwarding.
Otherwise, the ARN ID is cleared or the packet is discarded.
4.4.4. Cross-domain Aggregation and Mapping
The network edge device in current domain(domain A) receives the
message with the A ARN ID which is sent by another network edge
device, and queries the B ARN ID of A ARN ID mapped in the target
domain from a predetermined cross-domain mapping relationship. Then
it replaces A ARN ID with B ARN ID to obtain the new message and
sends it to the device in target domain(domain B). After the
controller of current domain receives the request of allocating ARN
ID in the target domain, it will establish cross-domain mapping
relationship to achieve the mapping of ARN ID between in the current
domain and target domain for the same application-required netwoik
path and send it to the netwoik edge devices. The ARN ID configured
in flow label,Destination Option Header (DOH),or Hop-by-Hop Option
Header(HBH) is changed to the new ARN ID, then the modified message
is obtained and sended the target domain.
4.4.5. Service Funtion Chain Based on ARN
In the SRv6 SFC scenario, the traditional solution of SRv6 SFC
requires allocating SIDs for each service (including each SF or each
user) and advertising relevant routes, leading to high complexity in
the number of SIDs and routes, which makes it impossible to truly
implement. The ARN-based approach can greatly simplify this SID and
route allocation mechanism. It only uses ARN IDs to integrate
network and service capabilities, while SIDs are only used as network
path identifiers, reducing the coupling with services.
Yang & Lin Expires 29 June 2026 [Page 10]
Internet-Draft ARN Framework December 2025
The gateway device of SFC received and parsed the SID in the service
flow. According to the instruction information of the SID function,
the IPv6 packet in the service flow and the corresponding extension
header are parsed to obtain the application and network capability
identifier(that is ARN ID), which is used to indicate the service
function SF. Furthermore, the outgoing interface or IP address to
the next-hop node corresponding to the SF indicated by the ARN ID is
obtained. According to the association table sent by the controller
device (or statically configured), the outgoing interface or IP
address to the next-hop node corresponding to the SF indicated by ARN
ID is searched, including the association between SF and destination
IP address or between SF and virtual interface.
4.4.6. Rate Limiting
Imposes traffic limits on specific ARN IDs, typically deployed at the
network edge device.
4.5. Controller
The controller generates ARN IDs in the way mentioned in Section 4.1.
The controller also configures user edge devices and network edge
devices, and manages the lifecycle of ARN IDs.
The controller will send the ARN ID and the application
characteristics corresponding to the ARN ID to the user edge device.
The controller will send user information and ARN ID preset
correspondence information to network edge device, which is used for
access control. At the same time, the controller will send the path
information and the preset correspondence of the ARN ID to the
network edge device, and the path information can be SR Policy.
A single controller can be centrally used, or multiple controllers
can be utilized to collectively fulfill the functions across various
stages of the network.
4.6. The Southbound Interface (SBI) of the Controller
The ARN ID and ARN service policies are transmitted from the
controller to the relevant network devices for execution through this
interface. Candidate protocols for this interface include PCEP, BGP,
and YANG-based protocols (NETCONF/RESTCONF).
5. ARN Encapsulation
Yang & Lin Expires 29 June 2026 [Page 11]
Internet-Draft ARN Framework December 2025
5.1. Locations for IPv6 ARN
ARN carries ARN ID option including ARN ID through the extension of
the IPv6 data plane. The location for carrying this information is
within the IPv6 Destination Options Header (DOH) or IPv6 Hop-by-Hop
Options Header (HBH).
The ARN ID option can be carried in the IPv6 Destination Options
Header. By using the DOH Options Header, the information carried can
be read by the destination node but would not normally be seen by
other nodes along the path.
The ARN ID option can be carried in the IPv6 Hop-by-Hop Options
Header. By using the HBH Options Header, the information carried can
be read by every node along the path.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | Option Type | Opt Data Len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ARN ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type: 8 Bits, ARN option, value to be allocated
ARN ID: 32 Bits
Figure 3: ARN ID Option
5.2. Locations for IPv4 ARN
TBD.
6. Use Cases
+---------------------+
| Network Controller |
+----+------------+---+
| |
+---+--+ +--+---+ +-------+
| | A | | | |
+-----+ | Back +------+ Back | | DC |
| HGW |------>| bone | B | bone | | Cloud |
+-----+ | Edge +------+ Edge +-----+ |
User | | C | | | |
| Bras +------+ | |Service|
+------+ +------+ +-------+
Yang & Lin Expires 29 June 2026 [Page 12]
Internet-Draft ARN Framework December 2025
Figure 4: Use case of ARN
This is a typical network where users access the network through a
Bras server, then via the backbone network, and finally access the
data center cloud services. Functions implemented by each device:
Home Gate Way(HGW): Acts as the user edge device, ARN ID can be
directly marked by it based on the services user has purchased and
flow characteristics of the application.
Bras: Provides functions such as access control based on Service-ID,
path mapping, service aggregation, and rate limiting. If the
incoming datagram carries an ARN ID, and the receiving interface has
turned on ARN. The legitimacy of the ARN ID can be verified. If the
ARN ID does not belong to the user, the verification will fail, and
the ARN ID will be cleared or the entire datagram will be discarded.
Otherwise, it will perform Path Mapping based on incoming ARN ID.
Network Controller: Configure user information and ARN ID mappings
for HGW. Configure access control, path mapping, and rate limiting
based on ARN ID for Bras.
Cloud Services: Provides specific application services.
Based on the different types of ARN services purchased by users, when
mapping paths in the domain for forwarding user traffic, three
network paths can be chosen according to the rules deployed by the
controller to meet the users' network requirements. As different
applications may have varying network demands, the five-tuple of the
datagrams is mapped to corresponding ARN IDs for different network
services. This enables the network's entry router to select
different network paths based on the different ARN IDs:
* Network Path A: Network path characterized by high bandwidth
* Network Path B: Network path characterized by low latency
* Network Path C: Network path characterized by low packet loss
If a user's different applications have varying network requirements,
the user can directly include the corresponding network service's ARN
ID in the transmitted datagrams. This allows the network's entry
router to select different network paths based on the different ARN
IDs.
Yang & Lin Expires 29 June 2026 [Page 13]
Internet-Draft ARN Framework December 2025
7. IANA Considerations
Option type number in the header should be allocated.
8. Security Considerations
This document will not affect the security of the Internet.
9. Normative References
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", STD 86, RFC 8200,
DOI 10.17487/RFC8200, July 2017,
<https://www.rfc-editor.org/rfc/rfc8200>.
[RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L.,
Decraene, B., Litkowski, S., and R. Shakir, "Segment
Routing Architecture", RFC 8402, DOI 10.17487/RFC8402,
July 2018, <https://www.rfc-editor.org/rfc/rfc8402>.
[RFC8754] Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J.,
Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header
(SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020,
<https://www.rfc-editor.org/rfc/rfc8754>.
[RFC8986] Filsfils, C., Ed., Camarillo, P., Ed., Leddy, J., Voyer,
D., Matsushima, S., and Z. Li, "Segment Routing over IPv6
(SRv6) Network Programming", RFC 8986,
DOI 10.17487/RFC8986, February 2021,
<https://www.rfc-editor.org/rfc/rfc8986>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.
Contributors
Joel Halpern
Email: jmh@joelhalpern.com
Many thanks to Joel Halpern for reviewing the ARN ID mapping
mechanism.
Yang & Lin Expires 29 June 2026 [Page 14]
Internet-Draft ARN Framework December 2025
Authors' Addresses
Feng Yang
China Mobile
China
Email: yangfeng@chinamobile.com
Changwang Lin
New H3C Technologies
China
Email: linchangwang.04414@h3c.com
Yang & Lin Expires 29 June 2026 [Page 15]