| < draft-ietf-sfc-nsh-tlv-11.txt | draft-ietf-sfc-nsh-tlv-12.txt > | |||
|---|---|---|---|---|
| SFC Yuehua. Wei, Ed. | SFC Yuehua. Wei, Ed. | |||
| Internet-Draft ZTE Corporation | Internet-Draft ZTE Corporation | |||
| Intended status: Standards Track U. Elzur | Intended status: Standards Track U. Elzur | |||
| Expires: 16 July 2022 Intel | Expires: 29 July 2022 Intel | |||
| S. Majee | S. Majee | |||
| Individual contributor | Individual contributor | |||
| C. Pignataro | C. Pignataro | |||
| Cisco | Cisco | |||
| D. Eastlake | D. Eastlake | |||
| Futurewei Technologies | Futurewei Technologies | |||
| 12 January 2022 | 25 January 2022 | |||
| Network Service Header Metadata Type 2 Variable-Length Context Headers | Network Service Header Metadata Type 2 Variable-Length Context Headers | |||
| draft-ietf-sfc-nsh-tlv-11 | draft-ietf-sfc-nsh-tlv-12 | |||
| Abstract | Abstract | |||
| Service Function Chaining (SFC) uses the Network Service Header (NSH) | Service Function Chaining (SFC) uses the Network Service Header (NSH) | |||
| (RFC 8300) to steer and provide context Metadata (MD) with each | (RFC 8300) to steer and provide context Metadata (MD) with each | |||
| packet. Such Metadata can be of various Types including MD Type 2 | packet. Such Metadata can be of various Types including MD Type 2 | |||
| variable length context headers. This document specifies several | variable length context headers. This document specifies several | |||
| such context headers that can be used within a service function path. | such context headers that can be used within a service function path. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 41 ¶ | skipping to change at page 1, line 41 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 16 July 2022. | This Internet-Draft will expire on 29 July 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 29 ¶ | skipping to change at page 2, line 29 ¶ | |||
| 2.2. Requirements Language . . . . . . . . . . . . . . . . . . 3 | 2.2. Requirements Language . . . . . . . . . . . . . . . . . . 3 | |||
| 3. NSH MD Type 2 format . . . . . . . . . . . . . . . . . . . . 3 | 3. NSH MD Type 2 format . . . . . . . . . . . . . . . . . . . . 3 | |||
| 4. NSH MD Type 2 Context Headers . . . . . . . . . . . . . . . . 4 | 4. NSH MD Type 2 Context Headers . . . . . . . . . . . . . . . . 4 | |||
| 4.1. Forwarding Context . . . . . . . . . . . . . . . . . . . 4 | 4.1. Forwarding Context . . . . . . . . . . . . . . . . . . . 4 | |||
| 4.2. Tenant Identifier . . . . . . . . . . . . . . . . . . . . 6 | 4.2. Tenant Identifier . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.3. Ingress Network Node Information . . . . . . . . . . . . 6 | 4.3. Ingress Network Node Information . . . . . . . . . . . . 6 | |||
| 4.4. Ingress Network Source Interface . . . . . . . . . . . . 7 | 4.4. Ingress Network Source Interface . . . . . . . . . . . . 7 | |||
| 4.5. Flow ID . . . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.5. Flow ID . . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.6. Source and/or Destination Groups . . . . . . . . . . . . 8 | 4.6. Source and/or Destination Groups . . . . . . . . . . . . 8 | |||
| 4.7. Policy Identifier . . . . . . . . . . . . . . . . . . . . 9 | 4.7. Policy Identifier . . . . . . . . . . . . . . . . . . . . 9 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | |||
| 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 | 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 7.1. MD Type 2 Context Types . . . . . . . . . . . . . . . . . 10 | 7.1. MD Type 2 Context Types . . . . . . . . . . . . . . . . . 10 | |||
| 7.2. Forwarding Context Types . . . . . . . . . . . . . . . . 10 | 7.2. Forwarding Context Types . . . . . . . . . . . . . . . . 11 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 11 | 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . 11 | 8.1. Normative References . . . . . . . . . . . . . . . . . . 12 | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . 12 | 8.2. Informative References . . . . . . . . . . . . . . . . . 12 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 1. Introduction | 1. Introduction | |||
| The Network Service Header (NSH) [RFC8300] is the Service Function | The Network Service Header (NSH) [RFC8300] is the Service Function | |||
| Chaining (SFC) encapsulation that supports the SFC architecture | Chaining (SFC) encapsulation that supports the SFC architecture | |||
| [RFC7665]. As such, the NSH provides following key elements: | [RFC7665]. As such, the NSH provides following key elements: | |||
| 1. Service Function Path (SFP) identification. | 1. Service Function Path (SFP) identification. | |||
| 2. Indication of location within a Service Function Path. | 2. Indication of location within a Service Function Path. | |||
| skipping to change at page 5, line 44 ¶ | skipping to change at page 5, line 44 ¶ | |||
| Figure 7: Forwarding Context - 5(Session ID) | Figure 7: Forwarding Context - 5(Session ID) | |||
| where: | where: | |||
| Context Type (CT) is four bits-long field that defines the length | Context Type (CT) is four bits-long field that defines the length | |||
| and the interpretation of the Forwarding Context field. Please | and the interpretation of the Forwarding Context field. Please | |||
| see the IANA Considerations in Section 7. This document defines | see the IANA Considerations in Section 7. This document defines | |||
| these CT values: | these CT values: | |||
| - 0x0 - 12 bits VLAN identifier. See Figure 3. Reserved bits | - 0x0 - 12 bits VLAN identifier [IEEE.802.1Q_2018]. See | |||
| MUST be sent as zero and ignored on receipt | Figure 3. | |||
| - 0x1 - 24 bits double tagging identifiers. A service VLAN tag | - 0x1 - 24 bits double tagging identifiers. A service VLAN tag | |||
| followed by a customer VLAN tag [IEEE.802.1Q_2018]. The two | followed by a customer VLAN tag [IEEE.802.1Q_2018]. The two | |||
| VLAN IDs are concatenated and appear in the same order that | VLAN IDs are concatenated and appear in the same order that | |||
| they appeared in the payload. See Figure 4. Reserved bits | they appeared in the payload. See Figure 4. | |||
| MUST be sent as zero and ignored on receipt | ||||
| - 0x2 - 20 bits MPLS VPN label. See Figure 5. Reserved bits | - 0x2 - 20 bits MPLS VPN label([RFC3032])([RFC4364]). See | |||
| MUST be sent as zero and ignored on receipt | Figure 5. | |||
| - 0x3 - 24 bits virtual network identifier (VNI). See Figure 6. | - 0x3 - 24 bits virtual network identifier (VNI)[RFC8926]. See | |||
| Reserved bits MUST be sent as zero and ignored on receipt | Figure 6. | |||
| - 0x4 - 32 bits Session ID ([RFC3931]). This is called Key in | - 0x4 - 32 bits Session ID ([RFC3931]). This is called Key in | |||
| GRE [RFC2890]. See Figure 7. | GRE [RFC2890]. See Figure 7. | |||
| Reserved bits in the context fields MUST be sent as zero and | ||||
| ignored on receipt. | ||||
| 4.2. Tenant Identifier | 4.2. Tenant Identifier | |||
| Tenant identification is often used for segregation within a multi- | Tenant identification is often used for segregation within a multi- | |||
| tenant environment. Orchestration system-generated tenant IDs are an | tenant environment. Orchestration system-generated tenant IDs are an | |||
| example of such data. This context header carries the value of the | example of such data. This context header carries the value of the | |||
| Tenant identifier. | Tenant identifier. [OpenDaylight-VTN] Virtual Tenant Network (VTN) | |||
| is an application that provides multi-tenant virtual network on an | ||||
| SDN controller. | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Metadata Class = 0x0000 | Type = TBA2 |U| Length = var| | | Metadata Class = 0x0000 | Type = TBA2 |U| Length = var| | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| ~ Tenant ID ~ | ~ Tenant ID ~ | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 8: Tenant Identifier List | Figure 8: Tenant Identifier List | |||
| skipping to change at page 7, line 29 ¶ | skipping to change at page 7, line 29 ¶ | |||
| Node ID: Represents an opaque value of the ingress network node | Node ID: Represents an opaque value of the ingress network node | |||
| ID. The structure and semantics of this field are deployment | ID. The structure and semantics of this field are deployment | |||
| specific. For example, Node ID may be a 4 octets IPv4 address | specific. For example, Node ID may be a 4 octets IPv4 address | |||
| Node ID, or a 16 octets IPv6 address Node ID, or a 6 octets MAC | Node ID, or a 16 octets IPv6 address Node ID, or a 6 octets MAC | |||
| address, or 8 octets MAC address (EUI-64), etc. | address, or 8 octets MAC address (EUI-64), etc. | |||
| 4.4. Ingress Network Source Interface | 4.4. Ingress Network Source Interface | |||
| This context identifies the ingress interface of the ingress network | This context identifies the ingress interface of the ingress network | |||
| node. | node. The l2vlan (135), l3ipvlan (136), ipForward (142), mpls (166) | |||
| in [IANAifType] are examples of source interfaces. | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Metadata Class = 0x0000 | Type = TBA4 |U| Length = var| | | Metadata Class = 0x0000 | Type = TBA4 |U| Length = var| | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| ~ Source Interface ~ | ~ Source Interface ~ | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 10: Ingress Network Source Interface | Figure 10: Ingress Network Source Interface | |||
| skipping to change at page 8, line 8 ¶ | skipping to change at page 8, line 8 ¶ | |||
| Length: Indicates the length of the Source Interface in octets | Length: Indicates the length of the Source Interface in octets | |||
| (see Section 2.5.1 of [RFC8300]). | (see Section 2.5.1 of [RFC8300]). | |||
| Source Interface: Represents an opaque value of identifier of the | Source Interface: Represents an opaque value of identifier of the | |||
| ingress interface of the ingress network node. | ingress interface of the ingress network node. | |||
| 4.5. Flow ID | 4.5. Flow ID | |||
| Flow ID provides a field in the NSH MD Type 2 to label packets | Flow ID provides a field in the NSH MD Type 2 to label packets | |||
| belonging to the same flow. Absence of this field, or a value of | belonging to the same flow. For example, [RFC8200] defined IPv6 Flow | |||
| zero denotes that packets have not been labeled. | Label as Flow ID, [RFC6790] defined an entropy label which is | |||
| generated based on flow information in the MPLS network is another | ||||
| example of Flow ID. Absence of this field, or a value of zero | ||||
| denotes that packets have not been labeled. | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Metadata Class = 0x0000 | Type = TBA5 |U| Length = 4 | | | Metadata Class = 0x0000 | Type = TBA5 |U| Length = 4 | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Flow ID | | | Flow ID | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 11: Flow ID | Figure 11: Flow ID | |||
| The fields are described as follows: | The fields are described as follows: | |||
| Length: Indicates the length of the Flow ID in octets (see | Length: Indicates the length of the Flow ID in octets (see | |||
| Section 2.5.1 of [RFC8300]). [RFC8200] defined IPv6 Flow Label as | Section 2.5.1 of [RFC8300]). For example, IPv6 Flow Label in | |||
| a 20-bit long unsigned integer. Also, [RFC6790], which defined | [RFC8200] is 20-bit long. An entropy label in the MPLS network in | |||
| the use of an entropy label in the MPLS network, is 20-bit long. | [RFC6790] is also 20-bit long. | |||
| Flow ID: Represents an opaque value of the Flow ID. The Flow ID | Flow ID: Represents an opaque value of the Flow ID. The Flow ID | |||
| is right justified (appears in the least significant bits of the | is right justified (appears in the least significant bits of the | |||
| Flow ID word) and is padded on the left with bits which MUST be | Flow ID word) and is padded on the left with bits which MUST be | |||
| sent as zero and ignored on receipt. | sent as zero and ignored on receipt. | |||
| 4.6. Source and/or Destination Groups | 4.6. Source and/or Destination Groups | |||
| Intent-based systems can use this data to express the logical | Intent-based systems can use this data to express the logical | |||
| grouping of source and/or destination objects. [OpenStack] and | grouping of source and/or destination objects. [OpenStack] and | |||
| skipping to change at page 12, line 21 ¶ | skipping to change at page 12, line 49 ¶ | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed., | [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed., | |||
| "Network Service Header (NSH)", RFC 8300, | "Network Service Header (NSH)", RFC 8300, | |||
| DOI 10.17487/RFC8300, January 2018, | DOI 10.17487/RFC8300, January 2018, | |||
| <https://www.rfc-editor.org/info/rfc8300>. | <https://www.rfc-editor.org/info/rfc8300>. | |||
| 8.2. Informative References | 8.2. Informative References | |||
| [IANAifType] | ||||
| IANA, "IANAifType", 2021, | ||||
| <https://www.iana.org/assignments/ianaiftype-mib/ | ||||
| ianaiftype-mib>. | ||||
| [OpenDaylight] | [OpenDaylight] | |||
| OpenDaylight, "Group Based Policy", 2021, | OpenDaylight, "Group Based Policy", 2021, | |||
| <https://docs.opendaylight.org/en/stable-fluorine/user- | <https://docs.opendaylight.org/en/stable-fluorine/user- | |||
| guide/group-based-policy-user- | guide/group-based-policy-user- | |||
| guide.html?highlight=group%20policy#>. | guide.html?highlight=group%20policy#>. | |||
| [OpenDaylight-VTN] | ||||
| OpenDaylight, "OpenDaylight VTN", 2021, <https://nexus.ope | ||||
| ndaylight.org/content/sites/site/org.opendaylight.docs/mas | ||||
| ter/userguide/manuals/userguide/bk-user-guide/ | ||||
| content/_vtn.html>. | ||||
| [OpenStack] | [OpenStack] | |||
| OpenStack, "Group Based Policy", 2021, | OpenStack, "Group Based Policy", 2021, | |||
| <https://wiki.openstack.org/wiki/GroupBasedPolicy>. | <https://wiki.openstack.org/wiki/GroupBasedPolicy>. | |||
| [RFC2890] Dommety, G., "Key and Sequence Number Extensions to GRE", | [RFC2890] Dommety, G., "Key and Sequence Number Extensions to GRE", | |||
| RFC 2890, DOI 10.17487/RFC2890, September 2000, | RFC 2890, DOI 10.17487/RFC2890, September 2000, | |||
| <https://www.rfc-editor.org/info/rfc2890>. | <https://www.rfc-editor.org/info/rfc2890>. | |||
| [RFC3032] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y., | ||||
| Farinacci, D., Li, T., and A. Conta, "MPLS Label Stack | ||||
| Encoding", RFC 3032, DOI 10.17487/RFC3032, January 2001, | ||||
| <https://www.rfc-editor.org/info/rfc3032>. | ||||
| [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private | ||||
| Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February | ||||
| 2006, <https://www.rfc-editor.org/info/rfc4364>. | ||||
| [RFC6790] Kompella, K., Drake, J., Amante, S., Henderickx, W., and | [RFC6790] Kompella, K., Drake, J., Amante, S., Henderickx, W., and | |||
| L. Yong, "The Use of Entropy Labels in MPLS Forwarding", | L. Yong, "The Use of Entropy Labels in MPLS Forwarding", | |||
| RFC 6790, DOI 10.17487/RFC6790, November 2012, | RFC 6790, DOI 10.17487/RFC6790, November 2012, | |||
| <https://www.rfc-editor.org/info/rfc6790>. | <https://www.rfc-editor.org/info/rfc6790>. | |||
| [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function | [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function | |||
| Chaining (SFC) Architecture", RFC 7665, | Chaining (SFC) Architecture", RFC 7665, | |||
| DOI 10.17487/RFC7665, October 2015, | DOI 10.17487/RFC7665, October 2015, | |||
| <https://www.rfc-editor.org/info/rfc7665>. | <https://www.rfc-editor.org/info/rfc7665>. | |||
| [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
| DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
| [RFC8926] Gross, J., Ed., Ganga, I., Ed., and T. Sridhar, Ed., | ||||
| "Geneve: Generic Network Virtualization Encapsulation", | ||||
| RFC 8926, DOI 10.17487/RFC8926, November 2020, | ||||
| <https://www.rfc-editor.org/info/rfc8926>. | ||||
| [RFC8979] Sarikaya, B., von Hugo, D., and M. Boucadair, "Subscriber | [RFC8979] Sarikaya, B., von Hugo, D., and M. Boucadair, "Subscriber | |||
| and Performance Policy Identifier Context Headers in the | and Performance Policy Identifier Context Headers in the | |||
| Network Service Header (NSH)", RFC 8979, | Network Service Header (NSH)", RFC 8979, | |||
| DOI 10.17487/RFC8979, February 2021, | DOI 10.17487/RFC8979, February 2021, | |||
| <https://www.rfc-editor.org/info/rfc8979>. | <https://www.rfc-editor.org/info/rfc8979>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Yuehua Wei (editor) | Yuehua Wei (editor) | |||
| ZTE Corporation | ZTE Corporation | |||
| End of changes. 20 change blocks. | ||||
| 24 lines changed or deleted | 57 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||